Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
How Deep Observability Improves Agency...
As agencies modernize their cybersecurity approach, aligning with Zero Trust (ZT) principles is no longer aspirational—it’s mission critical. But achieving a robust Zero Trust Architecture (ZTA) demands more than policy frameworks and access controls. It requires deep, continuous visibility into the network itself. This webinar explored how deep observability empowers agencies with actionable insights to meet Zero Trust compliance...
Add Favorite
Navigating Budgets in the Modern Landscape
We invite you to view our complimentary Demo Desk: Navigating Budgets in the Modern Landscape. Learn more about the ever-evolving dynamics of budgeting in today's financial landscape. During the second demo of our series, we looked into how changes across the board have impacted cybersecurity funding, new administrative changes and how they have reshaped budgets on every level. We also reviewed the new administration's impact and how Fortinet...
Add Favorite
Cybersecurity Resilience for Public Wat...
Public water and wastewater systems are ideal targets for cybercriminals because they combine three ingredients: tight budgets, lax cybersecurity practices, and almost guaranteed publicity, even for small attacks. While agencies can’t control increasing hacktivism targeting their utilities, you can increase your resilience by implementing basic cyber hygiene practices that make you a less attractive target and limit the damage from a cyb...
Add Favorite
2025 FedRAMP Updates
stackArmor teamed up with Carahsoft, the leader in public sector cloud solutions for Federal and Public sector organizations, to provide an exclusive webinar that showcased how commercial ISVs as well as Federal Agencies can take actionable steps to meet new and emerging Federal cybersecurity mandates, including assessing AI systems risk.Topics of this webinar included:Developing and managing digital compliance artifacts using OSCALUsing SBOMs...
Add Favorite
Securing Digital Identities in a Changi...
Attendees gained:Insights from industry experts on the evolving cybersecurity landscape and federal regulationsBest practices for implementing phishing-resistant MFA and passwordless authenticationInteractive discussion with peers and thought leaders on the challenges and opportunities in federal IT security
Add Favorite
Live Demo: How to Reduce Software Risk...
Cybersecurity isn’t just about firewalls and scans — it starts with writing secure code from the beginning. Watch Security Journey and Carahsoft's recent webinar, to learn how Security Journey can help teams reduce software vulnerabilities by training developers and engineers to think and act with security in mind.In this session, attendees learned how to:Equips developers with practical secure coding skillsAligns with federal cybe...
Add Favorite
Endpoint Security in Higher Education:...
Higher education institutions face an increasingly complex threat landscape, with endpoints—laptops, mobile devices, IoT, and research systems—being prime targets for cyberattacks. As IT professionals, securing these diverse endpoints while maintaining academic accessibility is a constant challenge.This webinar explored advanced endpoint security strategies, including Zero Trust architecture, Endpoint Detection and Response (EDR),...
Add Favorite
Securing IT/OT Convergence: Lessons fro...
The convergence of IT and OT within the Department of Defense (DOD) and the federal government presents unique cybersecurity challenges, particularly in protecting critical infrastructure and industrial control systems. As highlighted in the latest CrowdStrike Global Threat Report, adversaries are increasingly targeting operational technology environments, exploiting vulnerabilities in industrial control systems and the Extended Internet of Th...
Add Favorite
Automate and Improve Your Cyber Operati...
The Cyber Operational Readiness Assessment (CORA) program evaluates the cybersecurity posture and resiliency of each Authorization Boundary using a broad set of security, risk, and mission data. The problem for Defense and Intelligence Agencies is that they face limitations when trying to combine this data in meaningful, efficient ways that keep them continuously prepared for inspections.In our recent webinar, our Security and Risk Solution Co...
Add Favorite
Quantum Technologies and the Public Sec...
Quantum technologies are rapidly moving from research labs into real-world applications. For government and public sector IT leaders, gaining a clear understanding of quantum computing, quantum networks, and post-quantum security is essential for making informed strategic decisions. These developments are reshaping the future of data protection, communications and mission-critical systems across the federal enterprise.In this session, Bob Gour...
Add Favorite
Back to Search Begin New Search