Back to Search Begin New Search Save Search Auto-Notify
Cloud Security Webinar: Myths and Oppor...
More and more, security is cited as a primary reason organisations around the world are embracing the cloud. Organisations that have moved to the cloud typically claim visibility and control over their data increases, versus what they had on-premises. But others continue to resist moving to the cloud arguing that it’s a security issue. How real are these threats and concerns, and where is the line between fact and myth? Join Tim Rains, t...
Add Favorite
Elevate Your Threat Hunting Program
The complexity of today's networks and the sheer amount of information being provided has made threat hunting a necessary part of every security program. Discover how ReversingLabs can enrich Splunk data with our industry leading threat intelligence. We will show you how to easily hunt for threats specifically targeted at your organization using our Splunk app which enables quicker malware identification and visualization. During this on-deman...
Add Favorite
Creating a Cybersecurity Professional D...
Cybersecurity is a diverse and technically complex profession. Security monitoring, intrusion detection, project management, education, and awareness are just a few skills vital to the modern cybersecurity team. Leaders are struggling to recruit and retain professionals with these critical skills in a market with dramatically increasing demand for talent. This poses a real threat to the continued operation of cybersecurity teams that require c...
Add Favorite
Get Ahead of Ransomware with Splunk & AWS
From medical record systems to public transportation infrastructure, the onslaught of recent ransomware attacks has upended organizations around the world. Although a security issue, the fast propagation and business-impacting nature of these attacks shows that ransomware is a greater concern that affects all of IT.How can you better prepare and respond to such threats?Join us for one of our 30 minute webinars where you'll learn how to apply b...
Add Favorite
Top 5 Security Challenges in Cloud Migration
Security tools are often incompatible or simply not optimized for the cloud or deployment processes. This means that security ends up causing high overhead due to multiple environments requiring unique tools, thus hindering your ability to streamline operations. Security tools may work well in one cloud environment but are too inflexible for the needs of a hybrid cloud. Agencies need adaptable security tools that fit anywhere they build, from...
Add Favorite
Application Security from the Cloud wit...
As your agency increasingly engages constituents, employees, and contractors through web and IP-based applications, web application security must be a critical priority. Attackers know that disrupting web applications can result in significant loss of important and sensitive government data. To prepare for the inevitable attacks, you need application security solutions that deliver fast and effective protection in order to safeguard your infra...
Add Favorite
Turn Your Endpoints Into Defendpoints
Everyone knows that cybersecurity must be a top focus for public sector agencies. The prevalence of attacks - only increasing over the last few years - has offered plenty of new insights into how different endpoints are being targeted. With the growing number of endpoints within agencies, opportunities to break through and compromise systems are extensive. Agencies must ensure that all of their endpoints are completely protected and immune to...
Add Favorite
Geospatial Intelligence at Mission Spee...
The amount of geospatial data from sensors, smart phones, social media, drones, and other vehicles is exploding, and traditional analytics are struggling to keep up. To analyze and visualize such data effectively, government agencies are increasingly leveraging GPUs to obtain orders-of-magnitude improvements in speed. New GPU technologies for accelerating structured data and text analytics are enabling analysts to do their work at the speed o...
Add Favorite
Enhanced Digital Services Built for Pap...
In efforts to implement a widespread adoption of digital processes through paperless initiatives, government agencies such as the state of Hawaii have embraced Adobe Sign for its electronic signature needs - allowing for legal, secure, and 100% digital document processes from end to end.Adobe Sign enables agencies to cut the cost and hassle of manual, paper-based tasks by reducing the back-and-forth that typically accompanies document review a...
Add Favorite
The Art & Science of Modern Websites fo...
Website best practices have changed significantly over the past several years. From improved security to mobile-device readiness to better accessibility, government websites must meet many new demands. Join us for this complimentary webinar to learn:How to discover existing vulnerabilities on your websiteWays to make your website more accessibleHow website tweaks can drive cross-departmental satisfactionData-driven steps to increase citizen en...
Add Favorite
Back to Search Begin New Search