Back to Search Begin New Search Save Search Auto-Notify
Fortifying State and Local Defenses: Na...
Ransomware attacks are becoming alarmingly frequent and sophisticated, posing severe risks to state and local government by compromising data, disrupting critical services, and imposing substantial financial burdens. Government was a prime target of ransomware attacks throughout 2023 and into 2024, seeing a 48% increase year-over-year in the number of attacks according to data from the Zscaler ThreatLabz 2024 Ransomware Report. Understanding t...
Add Favorite
Dell Technologies Webinar Series 2024-2025
In this Dell Technologies Webinar Series, attendees learned about:AI & Generative AIEdge & 5GCyber Security & Data ProtectionMerging Legacy Virtualization & Cloud Native DevelopmentMission Critical InfrastructureCapturing Workloads & Building IT Solutions
Add Favorite
Network Derived Intelligence: Are Your...
Network-derived intelligence provided real-time, immutable data about what was happening within your environment beyond standard hack-prone logging. Participants joined Gigamon to explore how Network-Derived Intelligence helped with vulnerability detection, weak ciphers, non-standard port usage, and other cyber challenges that logs couldn’t address. During the webinar, attendees learned:What exactly is on your network in real-timeTo over...
Add Favorite
Operationalizing Zero Trust: NIST and B...
Over 15 years since its initial conception and more than three years since the U.S. federal government made it a fundamental tenet of its overall cybersecurity strategy, Zero Trust has only become more important as a strategic framework for government and critical infrastructure alike. While the imperative to implement Zero Trust has been well established, the question of “how” is less clear. Enter NIST and the National Cybersecuri...
Add Favorite
Use Cases in Threat Intelligence: Turni...
Attendees gained essential insights on modern cyber threats with experts from Google Public Sector and August Schell. The session explored the latest trends and emerging threats targeting U.S. Navy operations, aimed at strengthening cybersecurity and enhancing maritime security. Highlights included:A detailed overview of the current cyber threat intelligence and emerging trends targeting the U.S. public sector.Insights from Mandiant's latest t...
Add Favorite
PQC Migration: Where Are We Now?
Recent announcements from the likes of NIST, Gartner, and Google have highlighted the importance of post-quantum cryptography. These announcements have increased the sense of urgency for PQC migration. Given that PQC migration is a long-term and resource-intensive task, many are asking where the cryptography industry stands at this point. They want to know how they should be managing their PQC migrations, what kinds of tools they will need to...
Add Favorite
Next-Gen SOC at the Forefront
Recently, SOC Prime and Carahsoft hosted an exclusive webinar on the future of cybersecurity operations centers (SOCs). Participants discovered how next-gen SOCs empowered enterprise and MDR-focused organizations to stay ahead of evolving threats and minimize the risk of breaches by harnessing the power of cutting-edge technology, advanced automation, and community-driven threat intelligence.
Add Favorite
Final Frontier of Endpoint Security: Tr...
Intel’s cybersecurity experts explored cutting-edge advancements in endpoint security. Attendees learned about the evolution of endpoint protection and the critical need for enhanced visibility and traceability below the operating system level. Experts shared insights and demonstrated how Intel’s trusted security platform provides unparalleled device visibility and control. The webinar covered how to:Enhance your organization...
Add Favorite
Machine Identity Security Breakfast
Attendees joined Venafi, CyberArk & Carahsoft as we hosted a virtual event to learn about machine identity management challenges and solutions. The key takeaways attendees gained from this event:Expand Your Professional Network: Connect with peers and industry experts to exchange valuable insights and strategies for navigating current and future challenges in certificate lifecycle management.Future-Proof Your Cybersecurity: Dive into discu...
Add Favorite
NIST NCCoE Practice Guide: Implementing...
F5 hosted an exclusive webinar on implementing Zero Trust architectures, featuring a special guest speaker from NIST. F5 provided an overview of how its technologies apply to Zero Trust Architecture, including where F5 BIG-IP fits within this NCCoE practice guide implementation. During this webinar, attendees:Explore the NIST National Cybersecurity Center of Excellence (NCCoE) and its critical work in developing real-world implementation guide...
Add Favorite
Back to Search Begin New Search