Back to Search Begin New Search Save Search Auto-Notify
Simple, Cost-Effective Data Protection...
As Public Sector teams modernize IT, protecting workloads with a simple, cost-effective solution is essential. Red Hat, CloudCasa, and Carahsoft hosted an exclusive virtual event on September 24 to explore how Red Hat OpenShift and CloudCasa work together to deliver secure, scalable and low-cost data protection for virtual machines (VMs), containers and persistent volumes across OpenShift environments.Together, Red Hat and CloudCasa help agenc...
Add Favorite
Doing Business with Air Force Nuclear W...
The Air Force Nuclear Weapons Center (AFNWC) is the nuclear-focused center within Air Force Materiel Command (AFMC) synchronizing all aspects of nuclear materiel management on behalf of the AFMC commander and in direct support of Air Force Global Strike Command (AFGSC). Managing acquisition portfolios worth $75 billion, AFNWC is central to sustaining, modernizing, and integrating the air (guided missile and bomb), land (intercontinental ballis...
Add Favorite
Optimize Mobile Asset Management with A...
Federal law enforcement agencies operate in fast-moving, complex environments where managing mobile assets — vehicles, field equipment, mobile IT systems — is critical to mission success.In this session, attendees learned how ServiceNow’s AI platform delivers real-time visibility, automates inventory tracking, and predicts maintenance needs to maximize asset readiness and security.Insights on using AI to predict maintenance n...
Add Favorite
AI-Powered OSINT to Unify Intelligence...
In this webinar, we demonstrated a scalable, repeatable methodology for leveraging Large Language Models (LLMs) to extract intelligence from social media during civil unrest and politically sensitive events. Through a live demo, we walked through our OSINT workflow—from planning and collection to knowledge extraction and dissemination—showing how it could be applied across defense, public-health and enterprise missions to detect na...
Add Favorite
The AI-Powered Roadmap to Test Maturity
In this webinar, we explore the challenges public sector teams face in delivering secure, reliable software with traditional testing methods. The session introduces a Test Maturity Model designed specifically for the public sector, offering a clear roadmap to a more efficient, predictable, and AI-enhanced quality engineering process. This session will help you understand how to:Evaluate your team’s current testing maturity levelSet measu...
Add Favorite
Ghosts in the Network: APTs, AI and the...
State-sponsored threat actors like those behind Volt Typhoon aren’t relying on zero-days or smash-and-grab exploits—they’re quietly infiltrating critical networks by exploiting public vulnerabilities, using stolen credentials and leveraging built-in system tools to stay undetected for months. These campaigns are designed to evade EDR, avoid raising alarms and exploit blind spots that traditional controls were never designed t...
Add Favorite
Education Cyber Resilience: A 4-Part Se...
Attendees joined us for an exclusive webinar series where Cisco and Proficio will explore today’s top cyber threats in education and how your institution can prepare. From real-world ransomware case studies to practical resilience planning, we’ll highlight proven strategies to strengthen security in both K–12 and higher education. Attendees gained insight into:Current threat trends in education, including ransomware-as-a-serv...
Add Favorite
Safeguarding Your Data: Meeting CMMC Le...
Participants attended our Google Workspace CMMC webinar to learn how your organization can achieve CMMC Level 2 compliance and safeguard your sensitive data. With the upcoming accreditation requirements from the Department of Defense, it's more critical than ever for the Defense Industrial Base to secure Controlled Unclassified Information (CUI). Attendees joined us to learn about CMMC and why it's important, demonstrate how to leverage Google...
Add Favorite
Zero Trust for Justice Systems: Stop Da...
Cyberattacks are increasingly targeting justice systems, threatening sensitive case records, legal documents and even the identities of witnesses and victims. Many organizations still rely on outdated perimeter defenses, leaving critical systems and individuals at risk. Zentera and Carahsoft were joined on September 30th at 2 PM EST for an in-depth session on how Zentera’s “Collaboration Chambers” deliver Zero Trust security...
Add Favorite
Closing the Mobile Threat Blindspot: Wh...
Your SOC may have SIEM, SOAR, and EDR in place - but are you still blind to mobile threats? Attackers increasingly target employees through their smartphones with phishing, smishing, malicious apps, and social engineering tactics that traditional security tools miss. Without mobile threat intelligence, your organization is exposed to breaches that start at the human layer. In this webinar, attendees learned how to eliminate the blindspot and f...
Add Favorite
Back to Search Begin New Search