Navigating the BootHole Mitigation Process
Eclypsium researchers recently disclosed an arbitrary code execution vulnerability in the GRUB2 bootloader that can bypass Unified Extensible Firmware Interface (UEFI) and OS Secure Boot, impacting other OS defenses. In this webinar, John Loucaides, VP of Research & Development at Eclypsium, will help government agencies understand how to navigate the complex process of mitigating the GRUB2 BootHole vulnerability - without inadvertently ma...
The Future of Document Intelligence in...
Today, public sector agencies are faced with more physical and digital documents than ever before, and gaining access to information within them is a time-consuming and labor-intensive process that hinders efficiency and productivity. Government organizations are implementing technologies like digitization, automation, artificial intelligence (AI), and cloud-based systems to improve information access and data security, streamline processes, a...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.