Back to Search Begin New Search Save Search Auto-Notify
F5 BIG-IP Next - Explore the Next Gener...
Attendees joined F5 and Iron Bow at Rocket City Tavern on Tuesday, June 18th for a hands-on lab featuring BIG-IP Next.All BIG-IP users were invited to this personalized training on BIG-IP Next, F5’s Next Generation Platform. During the session, attendees received a first look at the BIG-IP Next platform while going through application deployment exercises to address load balancing, application security, and app access use cases.During th...
Add Favorite
Leveraging AI for Audio and Video Redaction
The proliferation of audio and video evidential media continues to be on a constant rise. From body-worn camera footage to surveillance cameras to jailhouse calls to mobile phone camera footage, all these types of audio and video files that agencies have on record or are part of an investigation are subject to public release if it is part of a legal matter or part of an open public records request. The challenge with this is that the redaction...
Add Favorite
How AI is Revolutionizing Government Co...
Regscale and Carahsoft joined forces in the lead up to TechNet Cyber 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. As the landscape of government regulatory compliance evolves at an unprecedented pace, navigating the labyrinth of regulations while maintaining operational efficiencies has become increasingly daunting. Staying ahead of the curve is no longe...
Add Favorite
Steering Through Complexity: Grasping C...
Attendees of this webinar joined Nick Mistry, Lineaje's Chief Information Security Officer (CISO) and Scott Armstrong, Interos Industry Principal, for an illuminating webinar on the critical subjects of C-SCRM (Cyber Supply Chain Risk Management) and SBOM (Software Bill of Materials) vulnerability information. The speakers dove into the intricacies of specific policies and key regulations impacting cybersecurity, including Executive Order 1402...
Add Favorite
Multi-Layered Identity Authentication f...
As fraud actors increase their operations in velocity and capabilities, especially with the use of emerging technologies as the weapons of choice, you and your citizens are at risk of becoming a victim. Are you able to rapidly and at scale, confirm who is behind the keyboard? If the answer is no, then this webinar is for you. It will help you in solving your identity authentication challenges, diminishing a fraudster's success. Our esteemed sp...
Add Favorite
Powering Content Velocity with Generati...
Adobe and Carahsoft are excited to invite you to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Watch our on-demand webinar to learn how Adobe solutions drive innovation, adaptation, and collaboration within the Healthcare industry!Specifically, learn how to:Supercharge missions with Gen AI and bring precision, power, speed, and ease to allow for strategic and cre...
Add Favorite
Virtual Lunch N Learn with Workvivo
During this webinar participants learned how Workvivo by Zoom can personalize and automate communication, significantly boosting engagement throughout organizations.A Gallup research study highlighted during the session revealed that agencies with high engagement rates enjoy increased profits, reduced absences, and quickly recover from economic challenges.The webinar covered several key topics, including:The latest innovations introduced by Zo...
Add Favorite
Combatting Emerging Threats: Proofpoint...
Proofpoint, BluVector and Carahsoft are excited to invite you to join us in the lead up to TechNet 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. The digital evolution is moving quick, and it’s easy to be overwhelmed and click (or scan) something you shouldn’t have. Join us for an exclusive webinar where experts from Proofpoint and BluVector wi...
Add Favorite
Tableau Enablement Series Part 6 - Clea...
In an era where data-driven decision-making is paramount, the integrity and trustworthiness of your data are more crucial than ever. This webinar was designed to empower attendees with robust data preparation techniques, ensuring that their datasets are not only clean and well-structured but are also reliable and AI-ready. During this webinar, attendees learned how to:Transform raw data into trustworthy assets using Tableau Prep, ensuring thei...
Add Favorite
Shielding Helpdesk Operations Against S...
The Scattered Spider attack on MGM represented a significant breach in cybersecurity measures, disrupting the company’s services and jeopardizing customer data, all from a call into the helpdesk. The breach illustrated an identity gap in identity and access management, highlighting the significance of Caller ID Verification in fortifying helpdesk security protocols. This attack has shown the impact of an inability to ensure the identity...
Add Favorite
Back to Search Begin New Search