Back to Search Begin New Search Save Search Auto-Notify
Wiz: Advancing Cloud Security with Zero Trust
In today's ever-changing threat landscape, government agencies need a cloud security platform that can keep up. Wiz is a CNAPP platform that provides visibility and context into your cloud environment, helping you to implement Zero Trust security. As DoD spokesperson John Kirby said recently about the recent infiltration, "Cybersecurity is something you don't fix and walk away from. Cybersecurity is something you need to stay on top of every s...
Add Favorite
(IAM) Advantage: Best in Class Solution...
Attendees of this on-demand webinar learned how combining these trusted tools makes it easy to: Deliver the promised benefits of the last decade and enable the Zero Trust pillars Improve security, increase efficiency, and ensure better compliance with EO and RMF Directives Reduce the risk of data breaches and unauthorized access to sensitive information Streamline access granting and revocation to save time and resources while reducing risk
Add Favorite
Protecting NextGen 911 Systems
Cyber criminals are increasingly targeting emergency response networks throughout the United States. The risk to Next Generation (NextGen) 911 systems posed by advanced malware and denial-of-service (DoS) attacks highlight the critical need for local governments to secure emergency response networks. In this on-demand webinar, we discovered how AI-powered security and networking combine to support public sector and educational networks, includ...
Add Favorite
IDS: An Unexpected Key to Accelerating...
Public sector organizations wisely invested in Intrusion Detection Systems (IDS) to meet security requirements sufficient for the perimeter-based cyber threats of the time. However, today’s threat landscape is growing more complex and nefarious. As the urgency grows to combat modern advanced threats by adopting a Zero Trust security framework, public sector security teams find that standalone legacy IDS comes up short. Others may not yet...
Add Favorite
Ready for 2024: How Coordinated Vulnera...
With the 2024 election right around the corner, security and integrity are on your constituents’ minds. HackerOne convened a panel of cybersecurity and election integrity subject-matter experts to give leaders insight into new best practices in coordinated vulnerability disclosure (CVD). During this webinar, we reviewed the success of a recent hacker challenge conducted by the Election Security Research Forum and leading voting technolog...
Add Favorite
Cyber Security Strategies and the Impor...
With cyberattacks increasing in quantity and sophistication it is becoming more important for all government entities to develop a proactive and resilient data security risk management strategy. Developing a focused approach specific to edge computing environments is increasingly important because these areas can pose the most significant levels of security risk as they are not fully encompassed by the organization’s perimeter. Watch thi...
Add Favorite
Debunking False Claims on the Cyber Bat...
Following the tragic events in the Middle East in October, a spectrum of cyber actors turned to social media to express their sentiment surrounding the crisis. Shortly thereafter, hacktivists joined the fray, engaging in defacements and Distributed Denial of Service (DDoS) attacks on various nation-state websites. While many of these claims were legitimate, others were later debunked, underscoring the importance of verification and validation...
Add Favorite
Back to Search Begin New Search