Back to Search Begin New Search Save Search Auto-Notify
5 Steps to Comprehensive Data and Threa...
Many state and local government entities face increasingly complex challenges when it comes to keeping important data secure. Today there are more users, devices, applications, and data outside the organizational datacenter than inside. This network inversion introduces new blind spots, leaving agencies vulnerable to a new crop of cloud-enabled and credential-based attacks. Please join Netskope for a webinar to discuss how Netskope has partner...
Add Favorite
Find the Malicious Code Hiding on Your...
80% of web pages contain at least one third party library security vulnerability. Script threats like web skimming, formjacking, and Magecart attacks can steal data from visitors to your website. Content from third party sources are increasingly becoming major attack vectors for script attacks, which take advantage of compromised web tools you need. Join Akamai and Carahsoft for a complimentary webinar on June 24th to learn how you and your ag...
Add Favorite
Splunk 101 for Nonprofits
Join Splunk & SGT and learn how Splunk for Good helps nonprofits secure their data infrastructure, ensure operational efficiency, and create new innovative solutions that power their overall mission. Splunk for Good transforms the connective power of data into a strategic asset for nonprofits, universities, organizations, and people working to do good in the world. Through expertise, tools, training, and personalized support, we help simpl...
Add Favorite
Protecting Government and Corporate Sup...
Supply chain complexity is rising, and the public and private sectors are stronger together. The resulting approach is called cyber collective defense, and it's changing how businesses and the federal government protect their supply chains.Join IronNet Cybersecurity, Amazon Web Services (AWS), and Carahsoft on June 25th for an insightful webinar on how a collective defense strategy allows federal agencies to:Better understand their threat land...
Add Favorite
Moving to the Cloud with Operational Security
Federal agencies are under pressure to streamline and modernize infrastructure to reduce costs – and at the same time, they must also improve security. In this era of cloud computing, security products must work together seamlessly, and agency security teams need solutions to defend and protect government assets in the cloud. Cloud computing requires agencies and their security partners to focus on both securing data on-premise and data...
Add Favorite
Transform Endpoint Security with VMware...
In 2020, cyber defenders have seen a high level of innovation from cybercriminals, who are leveraging new tactics, techniques, and procedures (TTPs) to maintain persistence and counter incident response efforts. At an alarming rate, transnational organized crime groups and spies are leveraging cybercrime tools and services to conduct a wide range of crimes against government agencies and financial institutions. Criminals are increasingly shari...
Add Favorite
Introduction to Cryptocurrency Concepts
What Government Agencies, Regulators, and Investigators Need to Know As government agencies, regulators, and investigators look to more accurately assess the risks associated with the nascent industry of cryptocurrency, it is important to identify key players within the ecosystem. This complimentary webinar will cover the various typologies across the cryptocurrency space including gambling sites, hosted wallets, mining pools, high-risk exchan...
Add Favorite
IT Service Delivery for Distributed Wor...
Join Splunk, Forescout, and Alchemy Global to see how our solution will secure IT service delivery for distributed workforce enablement. With an unprecedented growth in remote connections, our workforce faces a new host of logistical constraints and a larger attack surface than ever before.Before we build an effective remote workforce program, we must ask these questions:How many endpoints are connected at any given time?Are those endpoints co...
Add Favorite
Zero Trust Security for the Digital Workspace
Security is an ongoing challenge for organizations and with today’s dynamic workforce, the challenge is ever-increasing. Rapidly changing work styles and increased use of SaaS applications have resulted in the End-User Computing Zero Trust model becoming one of the most important forms of alternative security, an architectural mindset aimed at securing and protecting your data. VMware Workspace ONE combines Zero Trust conditional access...
Add Favorite
Collective Defense and the Global Cyber...
Recent years have shown a massive expansion of the global cyber attack surface. The proliferation of IoT and smart devices plus the speed and scale of communications have created an environment that makes it easier for adversaries to exploit vulnerabilities in federal systems.Combined with the current work environment and the emergence of new threat vectors from key adversaries, we are entering a more dangerous cyber threat landscape than ever...
Add Favorite
Back to Search Begin New Search