Back to Search Begin New Search Save Search Auto-Notify
Understanding SASE: Why the Future of N...
Please join NetFoundry and Carahsoft to learn the key principles of SASE (Secure Access Service Edge) networks and how your agency can benefit from adopting this model. The digital transformation of businesses to an app-centric world reverses network and security service design conventions. This shift has caused individuals and/or teams responsible for security and risk management to look to a converged, cloud-native SASE to protect critical s...
Add Favorite
Splunk High-Performance Computing
Since the 1960s, supercomputers have played a critical role in countless scientific advancements. Traditionally, High-Performance Computing (HPC) was limited to exclusive groups such as university and government research. The commoditization of computer hardware experienced over the last decade has made HPC ubiquitous in its adoption. HPC is now mainstream and rapidly spreading across enterprises including academia, R1 institutions, banking, f...
Add Favorite
Navigating the Security Maze of the Rem...
With the outbreak of COVID-19, the demand for remote work has increased exponentially. Working from home presents a different set of cybersecurity challenges with most home offices having off-the-shelf routers with minimal security countermeasures. The new remote work and remote learner environments provide attackers with a new entry point which they can exploit more easily than the well-defended network used in the past. Leveraging malware po...
Add Favorite
Find the Malicious Code Hiding on Your...
80% of web pages contain at least one third party library security vulnerability. Script threats like web skimming, formjacking, and Magecart attacks can steal data from visitors to your website. Content from third party sources are increasingly becoming major attack vectors for script attacks, which take advantage of compromised web tools you need. Join Akamai and Carahsoft for a complimentary webinar on June 24th to learn how you and your ag...
Add Favorite
Splunk ESI Contract and DoD
DoD has been growing year over year, investing in Splunk to support continuous monitoring, IT operations, and a number of other use cases. In February, Carahsoft signed a five-year ESI agreement with Splunk. The agreement is a DoD-wide BPA that allows customers to leverage Splunk.Join Splunk and True Zero Technologies as we discuss:How the contract has been structuredThe value it brings to DoDHow to leverage the contractDon't miss out. Registe...
Add Favorite
Transform Endpoint Security with VMware...
In 2020, cyber defenders have seen a high level of innovation from cybercriminals, who are leveraging new tactics, techniques, and procedures (TTPs) to maintain persistence and counter incident response efforts. At an alarming rate, transnational organized crime groups and spies are leveraging cybercrime tools and services to conduct a wide range of crimes against government agencies and financial institutions. Criminals are increasingly shari...
Add Favorite
Introduction to Cryptocurrency Concepts
What Government Agencies, Regulators, and Investigators Need to Know As government agencies, regulators, and investigators look to more accurately assess the risks associated with the nascent industry of cryptocurrency, it is important to identify key players within the ecosystem. This complimentary webinar will cover the various typologies across the cryptocurrency space including gambling sites, hosted wallets, mining pools, high-risk exchan...
Add Favorite
Zero Trust Security for the Digital Workspace
Security is an ongoing challenge for organizations and with today’s dynamic workforce, the challenge is ever-increasing. Rapidly changing work styles and increased use of SaaS applications have resulted in the End-User Computing Zero Trust model becoming one of the most important forms of alternative security, an architectural mindset aimed at securing and protecting your data. VMware Workspace ONE combines Zero Trust conditional access...
Add Favorite
Seeing the Cybersecurity Battlefield: A...
Cybersecurity is a complex problem, constantly evolving and shifting with teams unable to understand where threats are emerging. While the tools being used are valuable and have costly limitations, operators need a full picture of the cybersecurity battlefield. Are you making the most out of your security investments? How can we enrich the picture for each team to ensure that they have the best possible information and insight into the securit...
Add Favorite
Webinar: Predict and Prevent with Splunk
Join us for a discussion on how you can leverage Splunk to visualize, monitor, and manage the performance of the key services that power your mission through real-time dashboards, reports, and alerts. Whether you're developing applications or running, securing, and auditing IT - Splunk can help you gain fast value from your data. During this informative webinar, we will discuss: How to leverage Splunk Enterprise, IT Service Intelligence (ITSI)...
Add Favorite
Back to Search Begin New Search