Back to Search Begin New Search Save Search Auto-Notify
Showing results for IoT
Search instead for Ito
Splunk & Forescout for Smart Transportation
Join Splunk, Forescout, and Carahsoft to see how Forescout provides continuous visibility of connected devices to Splunk to better identify, prioritize, and respond to incidents. The joint integration also enables the getting and storing of Forescout actions in Splunk. Policy-driven actions can be triggered by Splunk and executed through Forescout for immediate incident response. Forescout sends the action results to Splunk to facilitate close...
Add Favorite
How to Implement an Effective Zero Trus...
The rapid adoption of IoT devices, cloud infrastructures, the recent expansion of remote workforces, and the increased execution of service contracts with multi-tier contractors have created massive distributed IT networks placing more emphasis on Zero Trust approaches. These distributed environments display increased attack surface areas, creating multiple entry points for adversarial actors to penetrate and potentially own a technology ecosy...
Add Favorite
Immediately Gain Value From IoT
Enterprises are struggling to see value from IoT implementations. One of the main challenges is just getting real-time data from edge devices. Other challenges faced by government agencies include network availability, latency, cost of round-tripping between the edge and the enterprise, monitoring, and more. A new solution is needed to quickly manage and monitor thousands of edge agents deployed in or near the edge devices to enable edge data...
Add Favorite
Collective Defense and the Global Cyber...
Recent years have shown a massive expansion of the global cyber attack surface. The proliferation of IoT and smart devices plus the speed and scale of communications have created an environment that makes it easier for adversaries to exploit vulnerabilities in federal systems.Combined with the current work environment and the emergence of new threat vectors from key adversaries, we are entering a more dangerous cyber threat landscape than ever...
Add Favorite
Seeing the Cybersecurity Battlefield: A...
Cybersecurity is a complex problem, constantly evolving and shifting with teams unable to understand where threats are emerging. While the tools being used are valuable and have costly limitations, operators need a full picture of the cybersecurity battlefield. Are you making the most out of your security investments? How can we enrich the picture for each team to ensure that they have the best possible information and insight into the securit...
Add Favorite
Navigating the BootHole Mitigation Process
Eclypsium researchers recently disclosed an arbitrary code execution vulnerability in the GRUB2 bootloader that can bypass Unified Extensible Firmware Interface (UEFI) and OS Secure Boot, impacting other OS defenses. In this webinar, John Loucaides, VP of Research & Development at Eclypsium, will help government agencies understand how to navigate the complex process of mitigating the GRUB2 BootHole vulnerability - without inadvertently ma...
Add Favorite
FortiCloud Webinar
With the surge of Internet of Things (IoT) devices connecting to your organization's networks, agencies need to account for an increased attack surface. Improving your visibility into what is attached to your network has become essential. Join Fortinet and Carahsoft for an on-demand webinar to discuss how FortiNAC can provide network visibility to see everything connected to your network along with the ability to control those devices and user...
Add Favorite
Ask Me Anything: STEM Insights & Opport...
Upcoming opportunities for the next generation of scientists, mathematicians, engineers, and technologist to problem solve. The goal of the AFRL STEM Outreach Program is to foster a new generation of scientists, mathematicians, engineers and technologists who will one day discover, and problem solve in the nation’s defense laboratories and other supporting U.S. companies. In order to achieve this goal, there must be a concerted effort to...
Add Favorite
Enable Public Sector Digital Transforma...
View our on-demand virtual session to gain a thorough understanding of RabbitMQ in a networked, distributed architecture. This is a fantastic chance to discover how RabbitMQ aids in the successful implementation of digital transformation projects in modernization, IoT, edge computing, real-time events/analytics, InfoSec and more.
Add Favorite
Threat Hunting Masterclass Session 3: L...
Join CybernetIQ and Carahsoft for their three part on-demand Threat Hunting Masterclass. In this on-demand webinar series, Joe Cummins, CEO, CybernetIQ discusses real-life examples of teams, tradecraft, and technologies that are changing the way we see the cybersecurity situation. Session Description Register How to Make Sense of the Who, Why, and What in the Wire Download session one to hear real-life examples of teams, tradecraft, and techno...
Add Favorite
Back to Search Begin New Search