Back to Search Begin New Search Save Search Auto-Notify
2022 Red Hat Security Symposium On Demand
Join our on-demand Security Symposium webinar series, where IT security professionals can learn from Red Hat® and Intel security experts, partners, and peers to solve security issues together as a community. This Security Symposium is an on-demand, six-session webinar series with presentations from experts discussing hybrid cloud security challenges that organizations face and solutions to tackle these challenges. During this series, we...
Add Favorite
Safeguard M365 Data from Cyber Attacks
Attendees of this webinar explored M365 data defense strategies including: Rubrik tools that cyber-proof M365 data Rapid recovery at scale How to achieve air-gapped, immutable data resilience Register to view this on-demand recording.
Add Favorite
Protecting Academia - Securing Students...
Proofpoint and Carahsoft invited individuals and their cybersecurity teams to join them for an informative presentation on how to protect yourself and your organization from phishing attacks. Our expert speaker, James Stroud, Senior Sales Engineering Manager at Proofpoint, will cover the basics of phishing, the consequences of falling for a phishing attack, and best practices for protecting against them. Attendees in this on-demand webinar lea...
Add Favorite
Risk and Reels: A Cybersecurity Podcast...
Hackers, curiosity, security, pen-testers, kindness, analogies and Hollywood criminals. Welcome to the first episode of Risk and Reels with Jeffrey Wheatman, featuring Jayson Street (OG Pen Tester and Chief Chaos Officer for Trusec), a self-proclaimed hacker. WHAT IS RISK AND REELS: A CYBERSECURITY PODCAST? A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheat...
Add Favorite
Strategies for Improving Cyber Resilien...
State & Local governments, as well as educational institutions, are struggling to keep pace with advancing technology in the face of rising cybercrime. Only 48% of officials have reported having cybersecurity policies and standards across the country, according to a report by Sophos. With the Biden Administration's $1 billion cybersecurity grant program, it is crucial that State & Local governments and Education institutions are equipp...
Add Favorite
Cyber Resilience 2023 - Two Day Virtual...
Ever since the dawn of the internet, its usefulness lies in the data it handles, whether moving it, storing it, or calculating with it. As a result, just as Willie Horton once said he robbed banks because “that’s where the money is,” many of today’s cyber bad actors target agencies’ data because they can monetize it. As a result, cybersecurity is akin to the 20th century Cold War. On the one hand, bad actors ...
Add Favorite
Security and Compliance in 2024: Trends...
A content management system (CMS) is a key piece of the foundation for building modern digital experiences that span farther than just your website today. Global brands such as Mars, Stanley, Black & Decker, NASA and many more have trusted Drupal as their CMS to power their brand differentiating experiences. However, with a rise in cyber attacks, the security of your digital platform is critical. Join us for an insightful conversation with...
Add Favorite
Modernizing Cybersecurity in Government...
Public sector institutions, managing vast amounts of sensitive data with limited resources, face a heightened risk of cyberattacks. Attendees joined our session on January 31 to explore how ServiceNow and Tanium empower these organizations through efficient IT Asset Management and Vulnerability Management, ensuring accurate asset mapping, proactive vulnerability identification, automated patching, and streamlined compliance readiness, ultimate...
Add Favorite
Protect Your Students and Data from Cyb...
Carahsoft and iboss had an informational webinar on the features and benefits of implementing an E-Rate eligible Firewall-As-A-Service (FWaaS). The iboss Zero Trust Edge (ZTE) FWaaS platform can help protect students and data from cyber-attacks. It includes a wide range of advanced features, such as: Advanced Threat Protection (ATP) Cloud App Firewall and Monitoring Intrusion Prevention System (IPS) Advanced Antimalware Defense Domain Name Sys...
Add Favorite
More Securely Innovate the Enterprise
In the continually changing landscape of modern governance, federal civilian agencies must prioritize secure innovation within their environment. While harnessing technological advancements is crucial for enhancing public services and operational efficiency, it must be done hand in hand with a resolute dedication to cybersecurity. Red Hat hosted the More Securely Innovate the Enterprise event in Denver where government and IT professionals cam...
Add Favorite
Back to Search Begin New Search