Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
NVIDIA Software for Government Series
As cybersecurity threats continue to escalate and diversify, agencies must look for new ways to address them. Collecting and analyzing all of the data across a network in real time is cost-prohibitive and difficult—unless you can leverage accelerated AI. NVIDIA Morpheus is an open application framework that enables cybersecurity developers to create optimized AI pipelines for filtering, processing and classifying large volumes of data. E...
Add Favorite
Confluent Tech Talk Series
Confluent and Carahsoft led a series of five virtual Government Tech Talks from July to October 2023. Each session is designed to enable architects, software engineers and developers in the public sector to power mission outcomes, better serve constituents, ensure security and compliance, enhance IT efficiency and maximize productivity with a platform built for data in motion.Register for access to all five on-demand recordings: Wednesday, Jul...
Add Favorite
Strategies for Improving Cyber Resilien...
State & Local governments, as well as educational institutions, are struggling to keep pace with advancing technology in the face of rising cybercrime. Only 48% of officials have reported having cybersecurity policies and standards across the country, according to a report by Sophos. With the Biden Administration's $1 billion cybersecurity grant program, it is crucial that State & Local governments and Education institutions are equipp...
Add Favorite
Avoid Downtime by Protecting Your Opera...
Cyber-attacks on critical infrastructure increased 2000% in 2022, often damaging critical operations. Remote vendors and workers have complicated the situation even more by using personal laptops, BYOD and other devices with fewer security barriers on their home networks than they would have in the workplace. These remote connections have blurred the IT-OT segmentation and expanded the attack surface providing new entry points for hackers to e...
Add Favorite
CompTIA CySA+ certification (CS0-003) c...
Information security analyst is one of the fastest-growing job categories in the U.S., with 35 percent overall growth expected by 2031. CompTIA’s Cybersecurity Analyst+ (CySA+) is one of the most popular certifications related to the role — and it’s getting an update in 2023 to align with the most in-demand knowledge and skills requested by employers. Join Patrick Lane, Director of Certification Product Management at CompTIA,...
Add Favorite
CompTIA CASP+: Everything You Need to K...
Want to be an advanced cybersecurity practitioner? Then CompTIA’s CASP+ certification may be the perfect fit for you. The popular certification is getting an overhaul heading into 2022 to ensure it validates the most relevant and in-demand skills — from security architecture and operations to engineering and governance. Join Patrick Lane, Director of Products at CompTIA, to get the inside scoop on the latest CASP+ changes, includin...
Add Favorite
Building Cyber Resiliency for Your Crit...
During this webcast, we were joined by Forescout's Vincent Turmel, Strategic Alliances Director of OT Partnerships, and Carahsoft's Nikhil Gupta, Forescout SE Team Lead to discuss how eyeInspect can do the following: Provide quick identification of cyber risks like the presence of vulnerabilities on a specific device and operational risks like out-of-range process values. Give visibility into process data and identification of previously unkno...
Add Favorite
Free Yourself: Secure & Efficient EHR D...
Zscaler, a leading cloud cybersecurity company founded on Zero Trust principles, wants to help you save money, improve your clinical experience, and enhance your security posture. When tech companies are bought by investment banks and taken private, it historically means painful times for the company’s customers, including rate hikes, poor support, and contract lock-ins. These weaknesses are further exploited by the bad guys, and right...
Add Favorite
Achieving Zero Trust with the Service Mesh
In today’s increasingly interconnected and dynamic digital landscape, traditional perimeter-based security models are no longer sufficient to protect agencies from sophisticated cyber threats. Zero Trust is a more effective approach, emphasizing continuous monitoring and verification of users, devices and transactions within an organization’s network. Attendees joined Tetrate online for insights into how service mesh technology sup...
Add Favorite
Stop Breaches & Reduce Cyber Risk with...
K-12 and Higher Education organizations are being targeted by threat actors more than ever. In this presentation we discussed the threat landscape and how to leverage threat intelligence, EDR, MDR, and Identity Protection to keep you protected. Attendees joined KCAV, CrowdStrike, and former CISO of the State of Oklahoma, Matt Singleton, to discuss how CrowdStrike stops breaches and is reducing cyber risk for their customers. Matt has tremendou...
Add Favorite
Back to Search Begin New Search