Back to Search Begin New Search Save Search Auto-Notify
Showing results for IoT
Search instead for Ito
Threat Hunting Masterclass Session 3: L...
Join CybernetIQ and Carahsoft for their three part on-demand Threat Hunting Masterclass. In this on-demand webinar series, Joe Cummins, CEO, CybernetIQ discusses real-life examples of teams, tradecraft, and technologies that are changing the way we see the cybersecurity situation. Session Description Register How to Make Sense of the Who, Why, and What in the Wire Download session one to hear real-life examples of teams, tradecraft, and techno...
Add Favorite
Diving into BOD 23-01: Why Asset Visibi...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) published the Binding Operational Directive 23-01 for Improving Asset Visibility and Vulnerability Detection on Federal Networks with April 3, 2023 deadlines for all FCEB agencies. CISA’s asset visibility requirements are doing a big part in moving the industry forward and evolving the overall approach to asset inventory while also highlighting the importance of a comprehen...
Add Favorite
Unlocking F5: The Roadmap to Software-C...
F5 and J2R joined at New Orleans Marriott Metairie at Lakeway on September 28th for a TechTalk on F5's Software-Centric Solutions. We offered a comprehensive review of F5's current portfolio, highlighting key solutions, services, and technologies. It provided attendees with insights into F5's market positioning, core competencies, and emerging opportunities, laying the groundwork for the deep dives to follow. This interactive session offered v...
Add Favorite
Protecting Critical Infrastructure
When most people think about connected devices, they think smartphones or tablets, but that's just the tip of the iceberg. All kinds of smart devices and sensors are connected to your network. Protecting your network isn't easy, but it's made more challenging when you don't have visibility into an increasing number of unmanaged sensors and IoT devices. Gigamon and Armis want to help eliminate your blind spots with Gigamon Visibility and Analy...
Add Favorite
Navigating Tomorrow's Defense Supply Chain
For defense agencies to prepare for and mitigate high-impact supply chain disruptions, decision-makers must first have clear visibility into their operations and where vulnerabilities exist. As a result, more organizations rely on digital logistics, a transformative approach using data analytics to monitor, anticipate and respond to supply chain disruptions. Given the complexities of global supply chains and the ever-present potential for disr...
Add Favorite
Secure And Hunt At Scale With Armis
In today's connected world, unseen threats like compromised vendors, malware and vulnerable devices hide within your supply chain. Managing this vast attack surface feels impossible. Enter the Armis Intelligence Center. Armis Intelligence Center unifies global threat intelligence with real-time data on every device, from IT to OT and IoT. Get deep insights into vendor security, compromised components and ongoing threats. Proactively hunt threa...
Add Favorite
Safeguarding the Future: Navigating IoT...
During this on-demand webinar, attendees learned about: The backstory of IoT Why hackers love smart cities, buildings and educational Institutions What can be done now? The unexpected business value
Add Favorite
Back to Search Begin New Search