Back to Search Begin New Search Save Search Auto-Notify
Avoiding Log4j Vulnerabilities: Securin...
Most of today's government organizations operate using proprietary or "first-party" software. These proprietary applications (ie. GOTS tools) present a challenge as they receive limited support from off-the-shelf security platforms, which leaves organizations more vulnerable to hidden vulnerabilities within their custom solutions. Join Qualys on November 29th for a live webinar where you will learn: How enhancements will allow customers to cre...
Add Favorite
CTO Sessions: A Guide to BYOK and HYOK...
Cloud Security Alliance best practices require that keys be stored and managed outside of the cloud service provider and the associated encryption operations. Cloud Service Providers therefore offer Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK) services to enable customer control of the keys used to encrypt their data. Customer control of the keys allows for the separation, creation, ownership and control, including revocation, of encr...
Add Favorite
CTO SESSIONS: Everything You Need to Kn...
Without secure, enterprise-managed identity systems, adversaries can take over user accounts and gain a foothold in an agency to steal data or launch attacks. The Federal Zero Trust Strategy prioritizes defense against sophisticated phishing and directs agencies to consolidate identity systems so that protections and monitoring can be consistently applied. Multi-factor authentication (MFA) plays a critical part of the Government’s strat...
Add Favorite
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. The overview of the platform focused on: Discovering and managing an accurate, unified and c...
Add Favorite
Bridging the Gap: WIFI on School Buses
Register today for Fortinet's E-Rate webinar where our IT Education experts will discuss a groundbreaking announcement from the FCC. WIFI on school buses is now E-Rate funding eligible, and your partners at Fortinet are here to guide you through the opportunities this presents for your school. Fortinet’s IT Education experts are dedicated to helping your organization access crucial funding, enhancing, and safeguarding your technology inf...
Add Favorite
Atlassian Team Tour: Government 2024
Atlassian is transforming government teamwork with tailored solutions to meet your agency's security and compliance needs. Enhance service delivery, responsiveness and mission success with insights from this year’s Team Tour: Government which was hosted on March 6, 2024 in Washington, D.C. Access all recordings on-demand, including keynotes and breakout sessions, and discover: Actionable tips to break down silos so your teams can increas...
Add Favorite
Protecting the 2024 Election: Be Prepar...
After the events of the past few years, security is in the forefront of election officials’ minds. The individual states are responsible for conducting elections, so the National Association of Counties (NACo) at its annual legislative conference just conducted a series of workshops and panels on the range of threats facing election workers and voters alike. While physical threats, intimidation and harassment are primary concerns, there...
Add Favorite
Back to Search Begin New Search