Back to Search Begin New Search Save Search Auto-Notify
New Approach to Multi-Factor Authentication
Certificate-based, multi-factor authentication is a mainstay security technique used by the U.S. Federal Government to ensure the identities of entities within a Public Key Infrastructure (PKI). Two primary components of multi-factor authentication are "what you have"--such as a securely stored private key--and "what you know", a password to unlock access to the securely-stored credentials. For human users, multi-factor authentication is easil...
December 10, 2020
Organizer: Thales TCT Government Team at Carahsoft
Location: Webcast
Add Favorite
Dissecting and Preventing Advanced Phis...
How FedEX, UPS & DHL Customers were Tricked by an Advanced Phishing Campaign File-borne attacks are on the rise, and 80% of successful breaches are new, unknown, or zero-day attacks that are not recognized by traditional signature-based detection solutions, such as antivirus. An example of this is an April 2020 attack that delivered Dridex ransomware to FedEx, UPS, and DHL customers. Sophisticated phishing emails--cleverly disguised to app...
July 28, 2020
Organizer: Thales Government Team at Carahsoft
Location: Webcast
Add Favorite
Best Practices for Strong Authentication
Protecting your Intellectual Property and Online Transactions Certificate-based, multi-factor authentication is a mainstay security technique used by the U.S. Federal Government to secure access to agency networks, protect the identities of users, and ensure that a user is who they claim to be. Evolving needs around cloud applications and mobile devices, combined with rising threats, and the need to reduce costs, require entirely new considera...
June 25, 2020
Organizer: Thales TCT Government Team at Carahsoft
Location: Webcast
Add Favorite
Future Briefing: Cloud Data Security Ti...
We are at digital war and data is the target. No organization is immune from data security threats and the US Federal government is no exception. More than half of federal data is now stored in the cloud, and a significant portion is sensitive. Yet, despite this exposure, in the 2020 Thales Data Threat Report 99% of federal government respondents say at least some of their sensitive data in the cloud is not encrypted. IT security departments m...
June 17, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Data Security in a Perimeterless World
Historically, organizations have taken a perimeter based approach to cyber security, with the belief that a strong perimeter protected the IT infrastructure behind it. But, as agencies modernize legacy systems and move apps, systems and workloads to the cloud – and more employees, contractors and citizens connect remotely and from multiple devices – something is happening across federal networks; the perimeter is dissolving. Data i...
May 13, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Learning How to Secure your Digital Tra...
Thales enables federal agencies to accelerate their digital transformation vision and execution by making data safe in any environment, all while maintaining business agility. Our data security platform provides:EncryptionTokenizationHSM SolutionsAdvanced Key ManagementJoin us for a live webinar on August 29th to learn how we protect structured and unstructured data at rest, in motion, and in use across devices, processes, platforms, and envir...
August 29, 2019
Organizer: Thales Gov Team at Carahsoft Tech Corp
Location: Webcast
Add Favorite
Protecting Sensitive and Compliant Anal...
Big data collects and analyzes large amounts of data from heterogeneous sources to discover unprecedented new knowledge and understanding of scientific and business scenarios. Aiming to gain greater insight into patterns not generally discernible from smaller data sets, big data business intelligence enables visibility into associations and trends that otherwise go unnoticed.However, big data exposes the enterprise to numerous data security th...
June 20, 2019
Organizer: Thales Gov Team at Carahsoft Tech Corp
Location: Webcast
Add Favorite
Securing Virtual Machine-Based Security...
Join us for a complimentary webinar on May 30, 2019 to learn about the strong partnership between Thales eSecurity, the industry leader in access control encryption and key management solutions, and FireEye, the industry leader in external threat intelligent services.The Thales Vormetric Data Security Platform produces detailed security intelligence log information on file level access of sensitive data including server activity, access attemp...
May 30, 2019
Organizer: Thales Gov Team at Carahsoft Tech Corp
Location: Webcast
Add Favorite
The Changing Landscape of Data Security...
With digital government initiatives underway throughout U.S. Federal agencies, new attacks occurring daily, and traditional threats, many agencies are struggling to protect critical citizen data, financial information and government secrets. In this session we’ll address the state of data security in U.S. Federal agencies today, the changing landscape of risks to data, and agency IT security pros priorities for data security today. Based...
May 30, 2019
Organizer: Thales Cloud Protection & Licensing
Location: Webcast
Add Favorite
Data Security Summit
In modernization efforts across government, agencies are doing more than replacing or updating legacy systems. They are leveraging the cloud and related technologies to make the IT enterprise more efficient, adaptable and scalable. In the process, they are also making the enterprise more diverse and complex, especially as they adopt a multi-cloud approach to delivering access to services and data. Unfortunately, this increased diversity and co...
May 1, 2019
Organizer: Government Executive Media Group
Location: Washington, DC
Add Favorite
Back to Search Begin New Search