Delivering Cloud Capabilities to the Ta...
Today cloud computing is far more than just someone else’s computer, and taking advantage of modern containerized and virtualized application infrastructure brings challenges when moving out of the data center and into the dirt. Join experts Dominic Perez, CTO for Curtiss-Wright Defense Solutions and Brandon Gulla, CTO for Rancher Government Solutions, for this educational webinar on deploying cloud environments and integrating with priv...
The Tactical Edge: Mission-Ready Kubern...
Across DoD, intelligence and most civilian federal agencies, the ‘tactical edge’ is top of mind. The ability to put application workloads out in the field, literally on the front lines, has the potential to transform the outcomes of all kinds of missions, whether it’s AI-based computer vision on reconnaissance drones, communications infrastructure or supply chain and logistics. Kubernetes has emerged as the software platform...
Making the Case for a Federal Bureau of...
There is a clear and compelling need for a repository of systematically collected and analyzed data on cyber threat activity and of the relative effectiveness of different measures of cybersecurity, resilience and recovery. At the highest level, defense and effective deterrence of adversary activity in cyberspace requires data that is accurate, timely and pertinent to the policy and operational decisions made by government and industry executi...
Configuring Tactical Hardware In Minute...
Edge infrastructure is crucial to the operations of our warfighters but deploying and managing it in austere locations can be burdensome and time-consuming. To address these challenges, organizations are turning to Infrastructure as Code (IaC) to provision and manage IT infrastructure using code and automation tools. However, current solutions do not account for the nuances of the infrastructure used by the Department of Defense (DoD) and the...
Snake Oil and Turmoil: The Current Zero...
In 2021, President Joe Biden issued an executive order that mandated agencies to start planning for the migration to a Zero Trust Architecture (ZTA). Since then, hundreds of tech companies have jumped on the zero trust bandwagon. Unfortunately, the market is now crowded with no shortage of overzealous misinformation and hyperbole. It is clear to us that the current zero trust conversation is not resonating with most organizations. For governme...
Building an Operational Technology/Cont...
Securing critical infrastructure requires a combination of resources, technology and people that understand the unique nature of control systems and their supporting technology. People are the most critical element of the equation — without the right team that understands how to resource a control system/operational technology program, and without the right people to operate and maintain both cybersecurity capabilities and compliance pro...
Juniper Smart Session Router and Missio...
Warfighting increasingly relies on secure undeniable connectivity. As the nation’s adversaries target critical infrastructure, joint forces must be able to continue net-enabled combat and operations in the face of overburdened infrastructure, difficult environments, determined adversaries and insider threats. Juniper’s mission-first network, anchored on the Juniper Session Smart Router, enables organizations to adapt rapidly, provi...
The Art of Recovery: Avoiding Problems...
Government agencies face the same cyber threats to the integrity of their IT infrastructure as every other area of the economy, but the stakes can be even higher. Veeam Government Solutions and Pure Storage have worked together to produce a next-generation data protection and recovery methodology that helps government organizations avoid malicious activity or recover from a successful attack faster than ever imagined. With the increase in atta...
Learn to Implement a cATO Architecture
The value of achieving Continuous ATO (cATO) is well known at this point. What is less well known, however, are implementation details. Specifically, what categories of tools make it effective. Join us as we discuss the key concepts and components of a cATO architecture and walk through a use case of how the implementation works.
400G: Network Modernization Strategies...
The widespread use of mission critical, data-intensive services have accelerated more now than ever, and the desire for cloud-ready network infrastructure to support modern battlespace requirements is growing. Seamless connectivity demands higher bandwidth capacity and lower latency, thus network operators are turning to the adoption of 400G optical technologies as part of their network modernization strategy. 400G network upgrades provide the...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.