Back to Search Begin New Search Save Search Auto-Notify
Closing Public Sector Security Gaps: An...
Join Carahsoft, GuidePoint and Invicti for a webinar on closing public sector security gaps. Spend an hour with Invicti learning about how to best protect your web applications and APIs with dynamic application security (DAST). Mark Townsend, Invicti’s VP of Professional Services and Jean-Paul Bergeaux, GuidePoint’s Federal CTO, will be talking about an outside-in approach to application and API security testing and: Common challen...
Add Favorite
Managing Massive Amounts of Data in Tra...
Transportation projects involve a lot of information from various sources: environmental data, geospatial information, survey results, multi-disciplinary outputs, and more. Engineers, managers, and all other stakeholders must work with the most up-to-date and reliable data to achieve the best results. Furthermore, in a fast-paced world, flexibility and adaptability are critical. MicroStation simplifies this process by allowing engineers to att...
Add Favorite
The Future of Document Intelligence in...
Today, public sector agencies are faced with more physical and digital documents than ever before, and gaining access to information within them is a time-consuming and labor-intensive process that hinders efficiency and productivity. Government organizations are implementing technologies like digitization, automation, artificial intelligence (AI), and cloud-based systems to improve information access and data security, streamline processes, a...
Add Favorite
Improving Government Experiences: 4 Way...
A recent study cites that, “difficulty finding information and clarity of communications are the primary drivers of customer burden". A similar study cites, "39% of SLG leaders grade their department’s ability to deliver excellent, equitable, and secure citizen services an 'A'”. Alleviating customer burden can be challenging. Join Granicus for a complimentary webinar to hear from a government experience expert about how antic...
Add Favorite
DoDIIS Worldwide Webinar Series: Securi...
Babel Street and Carahsoft are excited to invite you to join us in the lead up to DoDIIS 2023 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. In today's digital landscape, organizations and government agencies face a growing threat from insider risks, which can have far-reaching consequences for reputation, business continuity, loss of life, and national securi...
Add Favorite
Operating with Continuous Compliance
Why is it important to move from reactive compliance to always compliant? Traditional approaches to ensuring standards compliance, including federal regulations like FIPS 140-2, FISMA and FedRAMP, involve slow, manual post-build security scanning as part of the authority-to-operate process. With different gates of approval, these processes catch compliance and security defects too late, creating rework and sacrificing operational agility. Prog...
Add Favorite
Pain-free, Controlled Technology Migrat...
Migrating cloud services, databases, and APIs can mean using an all-or-nothing approach that is risky, costly and time-consuming, putting your agency at risk of infrastructure routing complexities and user experience challenges that can slow down or even halt agency modernization efforts. Join LaunchDarkly online on November 14 to discover better, safer ways to migrate your agency’s tech stack and turbocharge your agency’s moderniz...
Add Favorite
Leveraging Delinea Server PAM for Smart...
Smart cards provide an enhanced level of security for Linux computers when users log on to Active Directory domains. If you use a smart card to log on, authentication requires a valid and trusted root certificate or intermediate root certificate that can be validated by a known and trusted certification authority (CA). Because smart cards rely on a public-private key infrastructure (PKI) to sign and encrypt certificates and validate that the c...
Add Favorite
Showcasing the Power of a Unified Secur...
Join us on November 15th for this CrowdStrike webinar where we will take a deeper dive into the benefits LogScale can provide security experts.
Add Favorite
Avoiding Log4j Vulnerabilities: Securin...
Most of today's government organizations operate using proprietary or "first-party" software. These proprietary applications (ie. GOTS tools) present a challenge as they receive limited support from off-the-shelf security platforms, which leaves organizations more vulnerable to hidden vulnerabilities within their custom solutions. Join Qualys on November 29th for a live webinar where you will learn: How enhancements will allow customers to cre...
Add Favorite
Back to Search Begin New Search