Back to Search Begin New Search Save Search Auto-Notify
Enhancing Security Across Digital Docum...
PDFs are widely used for storing, sharing, and archiving documents, including highly classified or confidential information. Ensuring the security of these PDF documents is crucial to protect against unauthorized access, data breaches, and information leaks that can have severe consequences for national security, privacy, and the integrity of government operations. Adobe is empowering agencies to transform their manual document processes with...
Add Favorite
Resilience Unleased: The Case for Devel...
During this webinar, attendees got to meet Synack, the premier security testing platform that offers Penetration Testing as a Service (PTaas) on its FedRAMP Moderate Authorized Platform. Synack enables federal, state and local government customers to increase cyber resilience, allowing them to find their most critical vulnerabilities and track improvements over time. During our complementary Synack webinar, attendees learned about: The Case fo...
Add Favorite
Migrating from a Legacy VPN to a ZTNA S...
Existing solutions based on virtual private networks (VPN) can’t keep pace with the scale of remote users and often lead complicated architectures and a poor end-user experience. Also threat actors know that VPNs are easily compromised – and give implicit access to the underlying network. New security challenges present themselves that traditional remote access solutions weren't designed to solve. To address this new reality, organ...
Add Favorite
Election Staffing Governance: Securing...
Provisioning identity security for seasonal election workers presents a myriad of challenges for government election boards and commissions. Managing identities across disparate systems and platforms becomes particularly complex due to the temporary nature of election work. Seasonal election workers, including poll clerks and ballot counters, require access to various electoral databases, polling stations, and voting equipment. Coordinating th...
Add Favorite
Securing CI/CD Pipelines with AWS & GitLab
Government agencies are starting to recognize the impact that Continuous Integration and Continuous Deployment (CI/CD) pipelines from the start, enable rapid and efficient delivery of applications. There is a critical need for automation as support teams can manage agile workflows, it is critical to understand where automation is released within existing tools to safeguard pipelines with automated checks and testing to prevent vulnerabilities...
Add Favorite
Mastering AWS Security: Leveraging Pris...
Attendees of this on-demand webinar learned about: Current trends in SLED cybersecurity Key strategies for securing your network, whether on-premises or in the cloud Elevating your cloud cybersecurity with Prisma Cloud to meet the demands of today's dynamic environments
Add Favorite
Experimenting with Messaging App Vulner...
This on-demand webinar explored Corellium GlitchChat and discussed: How to use Corellium GlitchChat in your security research work The current threats that target mobile messaging apps How 0-click methods steal data and compromise devices
Add Favorite
Safeguarding the Future: Navigating IoT...
During this on-demand webinar, attendees learned about: The backstory of IoT Why hackers love smart cities, buildings and educational Institutions What can be done now? The unexpected business value
Add Favorite
Navigating OT Security in the DoD
Attendees of this webinar gained insights on: Current threats that result from converged IT/OT operations Recent OT security legislation and impacts on the DoD The unique use cases for OT security in the DoD Tips and mitigation strategies for managing OT security threats
Add Favorite
Dual-Use Technology: Accelerating Capab...
In an era where technology advancements are both rapid and revolutionary, distinguishing between civilian and military applications poses significant challenges and opportunities for national security, foreign policy, and global technological leadership. This webinar delved into the intricacies of dual-use technology, spotlighting the urgent need for innovative approaches to identify, regulate, and leverage these technologies in bolstering sec...
Add Favorite
Back to Search Begin New Search