Back to Search Begin New Search Save Search Auto-Notify
Accelerating Your Zero Trust Architectu...
Join us for an exclusive Splunk webinar where we will provide an overview of the Zero Trust Framework and how you can leverage Splunk as a key component to your Zero Trust Architecture. Our experts will showcase the features, benefits, and capabilities of Splunk that will help you improve your organization’s security posture and accelerate your Zero Trust Architecture. During this webinar, attendees will: Gain a comprehensive understandi...
Add Favorite
Protect Your Government Agency's Data a...
Modernizing applications and migrating to public cloud platforms enhance agility and flexibility. But there are also trade-offs to consider, including new and borderless attack surfaces, lack of consistent visibility, and growing tool sprawl and tool expenses. Together, Gigamon and Sumo Logic enable organizations to build an effective and efficient monitoring and security posture that surfaces a level of understanding unattainable beforehand....
Add Favorite
How a U.S. County Solves Business Probl...
States, cities and counties across the United States trust Elastic, the industry leader in security, observability and search use cases, to solve their mission-critical problems with data-based insights.Elastic and Collin County took the virtual stage for a conversation exploring a real-world success story involving a single security use case that quickly expanded to other IT departments and personas. During the event, our featured speakers co...
Add Favorite
Closing Public Sector Security Gaps: An...
Join Carahsoft, GuidePoint and Invicti for a webinar on closing public sector security gaps. Spend an hour with Invicti learning about how to best protect your web applications and APIs with dynamic application security (DAST). Mark Townsend, Invicti’s VP of Professional Services and Jean-Paul Bergeaux, GuidePoint’s Federal CTO, will be talking about an outside-in approach to application and API security testing and: Common challen...
Add Favorite
The Future of Document Intelligence in...
Today, public sector agencies are faced with more physical and digital documents than ever before, and gaining access to information within them is a time-consuming and labor-intensive process that hinders efficiency and productivity. Government organizations are implementing technologies like digitization, automation, artificial intelligence (AI), and cloud-based systems to improve information access and data security, streamline processes, a...
Add Favorite
Mobile Security Posture at the Departme...
Developing mobile applications is difficult and fraught with challenges. The solution? Finding the best app security testing abilities to help ensure mobile app development efforts are in line with Federal requirements and standards. NowSecure analyzes and continuously monitors mobile apps for security, privacy and compliance issues, scoring the risk with actionable information to help agencies protect themselves from mobile risks in their mob...
Add Favorite
Democracy Goes Digital: The One Thing T...
During this webinar, attendees will learn: How to detect both internal and external actors in voting systems Novel approaches to threat detection and response that can be deployed easily The detailed threat intelligence you will receive in real time about actors threatening election systems
Add Favorite
Leveraging Delinea Server PAM for Smart...
Smart cards provide an enhanced level of security for Linux computers when users log on to Active Directory domains. If you use a smart card to log on, authentication requires a valid and trusted root certificate or intermediate root certificate that can be validated by a known and trusted certification authority (CA). Because smart cards rely on a public-private key infrastructure (PKI) to sign and encrypt certificates and validate that the c...
Add Favorite
Showcasing the Power of a Unified Secur...
Join us on November 15th for this CrowdStrike webinar where we will take a deeper dive into the benefits LogScale can provide security experts.
Add Favorite
Avoiding Log4j Vulnerabilities: Securin...
Most of today's government organizations operate using proprietary or "first-party" software. These proprietary applications (ie. GOTS tools) present a challenge as they receive limited support from off-the-shelf security platforms, which leaves organizations more vulnerable to hidden vulnerabilities within their custom solutions. Join Qualys on November 29th for a live webinar where you will learn: How enhancements will allow customers to cre...
Add Favorite
Back to Search Begin New Search