Back to Search Begin New Search Save Search Auto-Notify
F5 Networks Privileged User Authentication
Join F5 Networks for a webinar where we will discuss how SSH and Web management interfaces for routers, switches, secure telephony administration interfaces, firewall, IDS/IPS, DLP interfaces, storage array interfaces, VDI, and more, can be CAC/PIV/Smart Card enabled using F5 Privileged User Authentication (PUA). Attendees of this webinar will learn: How the F5 PUA provides Single Sign On (SSO) to all administration interfaces, infrastructure...
Add Favorite
ICAM Modernization: Honoring Your Legac...
Government agencies require a higher level of security and user experience than ever before. According to the Office of Management and Budget's updated policy around Identity, Credentials and Access Management (ICAM), agencies are being encouraged to use more flexible solutions, supporting pilots for new authenticators, and requiring the creation of a dedicated ICAM team.The answer? A multifaceted approach, involving access, security, governan...
Add Favorite
Top 5 Security Challenges in Cloud Migration
Security tools are often incompatible or simply not optimized for the cloud or deployment processes. This means that security ends up causing high overhead due to multiple environments requiring unique tools, thus hindering your ability to streamline operations. Security tools may work well in one cloud environment but are too inflexible for the needs of a hybrid cloud. Agencies need adaptable security tools that fit anywhere they build, from...
Add Favorite
Application Security from the Cloud wit...
As your agency increasingly engages constituents, employees, and contractors through web and IP-based applications, web application security must be a critical priority. Attackers know that disrupting web applications can result in significant loss of important and sensitive government data. To prepare for the inevitable attacks, you need application security solutions that deliver fast and effective protection in order to safeguard your infra...
Add Favorite
Turn Your Endpoints Into Defendpoints
Everyone knows that cybersecurity must be a top focus for public sector agencies. The prevalence of attacks - only increasing over the last few years - has offered plenty of new insights into how different endpoints are being targeted. With the growing number of endpoints within agencies, opportunities to break through and compromise systems are extensive. Agencies must ensure that all of their endpoints are completely protected and immune to...
Add Favorite
Creating a Cybersecurity Professional D...
Cybersecurity is a diverse and technically complex profession. Security monitoring, intrusion detection, project management, education, and awareness are just a few skills vital to the modern cybersecurity team. Leaders are struggling to recruit and retain professionals with these critical skills in a market with dramatically increasing demand for talent.This poses a real threat to the continued operation of cybersecurity teams that require ch...
Add Favorite
Global Threat Intelligence
You're invited to attend our Secureworks webinar on the benefits of Threat Intelligence Services. During the webinar, learn how Secureworks' Global Threat Intelligence Service delivers early warning and actionable insights based on data from threats collected. These insights are based from an in-depth analysis of emerging threats and vulnerabilities enabling clients to quickly protect against cyber attacks. Join Kenneth Ma, Senior Security Eng...
Add Favorite
Five Ways Government Can Streamline Pro...
Citizens and staff members expect more from government digital services now more than ever before. At the same time, agencies are having to accomplish more with less in a flat budget environment. Digital forms and electronic signatures can help government do more with less while meeting rising expectations from the public staff. Register now to secure your spot! Join DocuSign to learn how the most successful government agencies are streamlinin...
Add Favorite
Ransomware: The Cyber Warfare Attack To...
Ransomware attacks are on the rise, with at least 22 reported breaches of public sector networks in 2019 alone. Popular targets are cities, police stations, and schools, and the attacks can tally up millions of dollars in recovery costs. This situation is likely much worse, as many ransomware attacks are unreported. Public sector organizations are typically understaffed and underfunded, making them ripe targets for malicious actors intent on c...
Add Favorite
Safeguarding Elections: Protecting Citi...
The Mueller report, following the 2016 election, identified malicious adversaries that undermined trust in the democratic process. With the complex and multifaceted threats we are facing with the upcoming 2020 elections, there is an urgent need to protect our electoral infrastructure.Election interference also poses a threat to citizens' personal information. Personal Identifiable Information, PII, such as social security numbers, are accessib...
Add Favorite
Back to Search Begin New Search