Achieving Zero-Trust Architecture: Cult...
The implementation of zero-trust architecture (ZTA) requires a fundamental cultural change among and within different government agencies. “Never trust … Always verify” is a profound pivot from the current mindset inside the federal government. Unfortunately, as is well documented, the public sector accepts change slowly, which is a problem in this era of rapid technological change. Notably, adversaries of the United States...
Today's Tactical Command Posts: Rapid S...
Join us as industry experts delve into the evolution and modernization of military command posts. This webinar is a must-attend for military professionals, defense contractors, systems engineers/integrators and anyone interested in the future of military communications and operations. With a focus on the rapid deployment capabilities and the growing need for resilient, secure communication systems in dynamic environments, this webinar will pro...
Water and Wastewater Infrastructure Thr...
Join Censys' Principal Security Researcher, Emily Austin, as she delves into investigations of recent attacks directed at water-related infrastructure systems by foreign adversaries.
Delivering Cloud Capabilities to the Ta...
Today cloud computing is far more than just someone else’s computer, and taking advantage of modern containerized and virtualized application infrastructure brings challenges when moving out of the data center and into the dirt. Join experts Dominic Perez, CTO for Curtiss-Wright Defense Solutions and Brandon Gulla, CTO for Rancher Government Solutions, for this educational webinar on deploying cloud environments and integrating with priv...
The Tactical Edge: Mission-Ready Kubern...
Across DoD, intelligence and most civilian federal agencies, the ‘tactical edge’ is top of mind. The ability to put application workloads out in the field, literally on the front lines, has the potential to transform the outcomes of all kinds of missions, whether it’s AI-based computer vision on reconnaissance drones, communications infrastructure or supply chain and logistics. Kubernetes has emerged as the software platform...
Making the Case for a Federal Bureau of...
There is a clear and compelling need for a repository of systematically collected and analyzed data on cyber threat activity and of the relative effectiveness of different measures of cybersecurity, resilience and recovery. At the highest level, defense and effective deterrence of adversary activity in cyberspace requires data that is accurate, timely and pertinent to the policy and operational decisions made by government and industry executi...
Configuring Tactical Hardware In Minute...
Edge infrastructure is crucial to the operations of our warfighters but deploying and managing it in austere locations can be burdensome and time-consuming. To address these challenges, organizations are turning to Infrastructure as Code (IaC) to provision and manage IT infrastructure using code and automation tools. However, current solutions do not account for the nuances of the infrastructure used by the Department of Defense (DoD) and the...
Snake Oil and Turmoil: The Current Zero...
In 2021, President Joe Biden issued an executive order that mandated agencies to start planning for the migration to a Zero Trust Architecture (ZTA). Since then, hundreds of tech companies have jumped on the zero trust bandwagon. Unfortunately, the market is now crowded with no shortage of overzealous misinformation and hyperbole. It is clear to us that the current zero trust conversation is not resonating with most organizations. For governme...
Building an Operational Technology/Cont...
Securing critical infrastructure requires a combination of resources, technology and people that understand the unique nature of control systems and their supporting technology. People are the most critical element of the equation — without the right team that understands how to resource a control system/operational technology program, and without the right people to operate and maintain both cybersecurity capabilities and compliance pro...
Juniper Smart Session Router and Missio...
Warfighting increasingly relies on secure undeniable connectivity. As the nation’s adversaries target critical infrastructure, joint forces must be able to continue net-enabled combat and operations in the face of overburdened infrastructure, difficult environments, determined adversaries and insider threats. Juniper’s mission-first network, anchored on the Juniper Session Smart Router, enables organizations to adapt rapidly, provi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.