Back to Search Begin New Search Save Search Auto-Notify
Migrating from a Legacy VPN to a ZTNA S...
Existing solutions based on virtual private networks (VPN) can’t keep pace with the scale of remote users and often lead complicated architectures and a poor end-user experience. Also threat actors know that VPNs are easily compromised – and give implicit access to the underlying network. New security challenges present themselves that traditional remote access solutions weren't designed to solve. To address this new reality, organ...
Add Favorite
Election Staffing Governance: Securing...
Provisioning identity security for seasonal election workers presents a myriad of challenges for government election boards and commissions. Managing identities across disparate systems and platforms becomes particularly complex due to the temporary nature of election work. Seasonal election workers, including poll clerks and ballot counters, require access to various electoral databases, polling stations, and voting equipment. Coordinating th...
Add Favorite
Securing CI/CD Pipelines with AWS & GitLab
Government agencies are starting to recognize the impact that Continuous Integration and Continuous Deployment (CI/CD) pipelines from the start, enable rapid and efficient delivery of applications. There is a critical need for automation as support teams can manage agile workflows, it is critical to understand where automation is released within existing tools to safeguard pipelines with automated checks and testing to prevent vulnerabilities...
Add Favorite
Mastering AWS Security: Leveraging Pris...
Attendees of this on-demand webinar learned about: Current trends in SLED cybersecurity Key strategies for securing your network, whether on-premises or in the cloud Elevating your cloud cybersecurity with Prisma Cloud to meet the demands of today's dynamic environments
Add Favorite
Experimenting with Messaging App Vulner...
This on-demand webinar explored Corellium GlitchChat and discussed: How to use Corellium GlitchChat in your security research work The current threats that target mobile messaging apps How 0-click methods steal data and compromise devices
Add Favorite
Safeguarding the Future: Navigating IoT...
During this on-demand webinar, attendees learned about: The backstory of IoT Why hackers love smart cities, buildings and educational Institutions What can be done now? The unexpected business value
Add Favorite
Navigating OT Security in the DoD
Attendees of this webinar gained insights on: Current threats that result from converged IT/OT operations Recent OT security legislation and impacts on the DoD The unique use cases for OT security in the DoD Tips and mitigation strategies for managing OT security threats
Add Favorite
Dual-Use Technology: Accelerating Capab...
In an era where technology advancements are both rapid and revolutionary, distinguishing between civilian and military applications poses significant challenges and opportunities for national security, foreign policy, and global technological leadership. This webinar delved into the intricacies of dual-use technology, spotlighting the urgent need for innovative approaches to identify, regulate, and leverage these technologies in bolstering sec...
Add Favorite
Bolster Identity Security with Password Safe
Attacks on identities, especially those with elevated access and privileges, are at an all-time high. Yet agencies are challenged with securing significantly more privileged accounts and supporting vastly larger decentralized networks than in years past. In this perimeter-less, remote world, organizations need a higher degree of privileged access protection that eliminates the ability for attackers to gain access and move laterally. A zero tru...
Add Favorite
Addressing Digital Document Accessibili...
In March 2022, the U.S. Department of Justice stated “Inaccessible web content and/or documents means that people with disabilities are denied equal access to information. An inaccessible website and documents can exclude people just as much as steps at an entrance to a physical location”. How is your organization addressing document accessibility, security, and usability? How are you leveraging your document as a digital ambassado...
Add Favorite
Back to Search Begin New Search