Back to Search Begin New Search Save Search Auto-Notify
Introduction to Peach Fuzzer and Fuzzin...
An on-demand webinar that introduces Peach Fuzzer and overviews our fuzzing technology. Peach Fuzzer is an automated security testing platform that finds unknown vulnerabilities in software & hardware systems, IoT & embedded devices. We help identify unknown vulnerabilities so you can close them and help prevent zero-day attacks.
Add Favorite
Core Level Security Extended to the Tac...
SIGNAL Webinar Series - Sponsored by SafeNet Assured Technologies Core data center functionality is moving to the field as part of battlefield multi-domain transformation. It is becoming commonplace for command posts, mobile command centers, and even mobile platforms: vehicles, ships, and planes to contain micro data centers that provide new capabilities and services at the cyber-edge to the warfighter. What still needs to be addressed is how...
Add Favorite
Creating a Cybersecurity Professional D...
Cybersecurity is a diverse and technically complex profession. Security monitoring, intrusion detection, project management, education, and awareness are just a few skills vital to the modern cybersecurity team. Leaders are struggling to recruit and retain professionals with these critical skills in a market with dramatically increasing demand for talent. This poses a real threat to the continued operation of cybersecurity teams that require c...
Add Favorite
Top 5 Security Challenges in Cloud Migration
Security tools are often incompatible or simply not optimized for the cloud or deployment processes. This means that security ends up causing high overhead due to multiple environments requiring unique tools, thus hindering your ability to streamline operations. Security tools may work well in one cloud environment but are too inflexible for the needs of a hybrid cloud. Agencies need adaptable security tools that fit anywhere they build, from...
Add Favorite
Dcode Virtual: Improving Cyber Posture...
The coronavirus outbreak emphasizes the need to bring the best emerging tech solutions into the government as adversaries have already shown that they are using this vulnerable time to attack the U.S. government. Join Dcode’s cyber expert Lauren Strayhorn to discuss these challenges and some of the best solutions to keep infrastructure secure, even while teleworking.
Add Favorite
Official (ISC)2 CISSP OnDemand | Certif...
The Official (ISC)² CISSP OnDemand is a self-paced learning solution that covers the 6 domains of the CISSP Common Body of Knowledge (CBK) in order to study for the CCSP examination. Delivered in a modular format, including 28.5 hours of HD video content accessible via any web-enabled device at any time- as often as you want. This CISSP OnDemand allows students to learn at their own pace, spend extra time on material where needed and rei...
Add Favorite
Improve Your Compliance Posture with Id...
Many modern hybrid enterprises and government agencies are struggling to ensure they have security controls everywhere necessary as well as being able to prove their effectiveness, especially with so many shared privileged accounts. Ever-changing industry as well as government regulations make it difficult to get and stay compliant. In order to reassure customers and the public that confidential data such as credit cards and health records are...
Add Favorite
CyberCast: Secure Remote Access for Adm...
YOU’VE SECURED THE WORKFORCE, NOW SECURE PRIVILEGED ACCESS. Current work-from-home requirements have resulted in organizations enabling entire workforces for remote access. As the FBI and other agencies report, this is a boon for cyber attackers who see this expanded attack surface as a feeding frenzy opportunity. Organizations of all sizes are at increased risk and need to secure remote access for privileged users, whose identities can...
Add Favorite
HPE Insights and Solutions for Enabling...
The COVID-19 pandemic has triggered enormous challenges for government IT, which must support a growing demand for a remote workforce to continue operations while responding to public health and welfare concerns. HPE and Aruba have mobilized the full weight of our respective resources and eco-system of partners to provide technology, solutions, expertise and support to help our government customers with these challenges. Join this webinar and...
Add Favorite
Trust, Verify & Authorize with DevSecOps
You may have a secure application today, but you cannot guarantee that it will still be secure tomorrow. Application security is a living process that must be constantly addressed throughout the application lifecycle. This requires continuous security assessments at every phase of the software development lifecycle (SDLC). The SEI has researched a continuous authorization concept—DevSecOps—that allows for constant interaction betwe...
Add Favorite
Back to Search Begin New Search