Back to Search Begin New Search Save Search Auto-Notify
Mastering the DoD Zero Trust Journey: B...
In a rapidly changing digital landscape, federal agencies face a constant battle against cyber threats. With the stakes higher than ever, you need a strategic advantage to safeguard your agency's sensitive assets and ensure the resilience of the Department of Defense network environment. Embracing the DoD Zero Trust Strategy is the key to unlocking this potential and positioning yourself as a hero in this evolving story. View the engaging webi...
Add Favorite
Tech on Tap: F5 Future Proofing Your Ap...
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
How U.S. Federal Agencies Can Apply TIC...
In this webinar speakers reviewed how US Federal agencies can apply Trusted Internet Connection (TIC) 3.0 to AWS workloads, as well as the AWS Year-End Savings (YES) Promotion for select AWS Services, available from June 8, 2023 to September 30, 2023. AWS subject matter experts discussed: What is the TIC initiative TIC 2.0 vs. TIC 3.0 differences TIC 3.0 controls How TIC 3.0 aligns with Zero Trust Applying TIC 3.0 framework to AWS workloads by...
Add Favorite
The New National Cybersecurity Strategy...
Attendees of this webinar joined OPSWAT for a discussion around the new National Cybersecurity Strategy, that builds upon previous efforts, such as Zero Trust, to bolster protections to secure America’s cyberspace and its digital ecosystem. The reliance on critical infrastructure makes those who manage it big targets for nation-state and ransomware attacks, as well as any members of the Defense Industrial Base that are managing the criti...
Add Favorite
Forcepoint Zero Trust Content Disarm ...
At this on-demand webinar, we discussed the following capabilities of Forcepoint in-depth: Defeating All Malware for emails coming into your environment by cleaning every file Integrating Directly with Microsoft 365 to remove malware prior to emails being sent from or delivered to the mailbox without costly tools that need to be updated like AV or Sandboxing Stopping Data Exfiltration with Forcepoint's anti-steganography capabilities built int...
Add Favorite
Mastering Identity Governance: Enhancin...
Many agencies struggle to keep up with recent Executive Orders, Digital Transformation, and Zero Trust Strategies when creating a cohesive platform. Identity is the first pillar of Zero Trust and waiting years to bring together a system that satisfies all your identity-based controls is not an option. UberEther provides the only FedRAMP High and DoD Impact Level 5 platform in a private tenant-managed SaaS environment that can be tailored to y...
Add Favorite
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
Free Yourself: Secure & Efficient EHR D...
Zscaler, a leading cloud cybersecurity company founded on Zero Trust principles, wants to help you save money, improve your clinical experience, and enhance your security posture. When tech companies are bought by investment banks and taken private, it historically means painful times for the company’s customers, including rate hikes, poor support, and contract lock-ins. These weaknesses are further exploited by the bad guys, and right...
Add Favorite
Achieving Zero Trust with the Service Mesh
In today’s increasingly interconnected and dynamic digital landscape, traditional perimeter-based security models are no longer sufficient to protect agencies from sophisticated cyber threats. Zero Trust is a more effective approach, emphasizing continuous monitoring and verification of users, devices and transactions within an organization’s network. Attendees joined Tetrate online for insights into how service mesh technology sup...
Add Favorite
Back to Search Begin New Search