Back to Search Begin New Search Save Search Auto-Notify
Amplify and Integrate Your Phishing Def...
Phishing attacks are relentless, and attackers continue to find creative ways to evade perimeter technologies such as Secure Email Gateways (SEGs). As malicious emails continue to reach user inboxes, there's increased risk of account compromise, data breach, and malware attacks, including ransomware. However, by combining training and human intuition with trusted intelligence, you will be able to reduce your organization's phishing threat expo...
Add Favorite
VMware Virtual Power Block Sessions
VMware and Carahsoft would like to offer you the opportunity to attend a variety of sessions on all of the topics you and your agency care about. Throughout the month of June, we are providing short sessions on: What's New in VMware vSAN 7 VMware Carbon Black Application Control Disaster Recovery in the Software-Defined Datacenter using vSAN and SRM Rubrik Sizing for Hyperconverged on vSAN VMware Bitfusion VMware vRealize Code Stream VMware vS...
Add Favorite
Beyond Traditional Anti-Virus: Protecti...
NS2 delivers innovative technologies from SAP and our affiliates to help our government clients execute their missions, securely. Cyber defense solutions from NS2, powered by GoSecure, are available to Government departments and agencies through the Continuous Diagnostic and Mitigation Program (CDM Program) on the Approved Products List. Help your agency detect and respond to cyber-attacks before they can damage your infrastructure or steal y...
Add Favorite
Essential App Protect Workshop
Join F5 Networks and Carahsoft for a workshop where you will learn how to remove the complexity from safeguarding your applications with F5's Essential App Protect Service - a feature-rich, checkbox-simple SaaS security for web apps deployed in any cloud. Essential App Protect shields your web-facing apps, as a service, without sacrificing speed and agility. Within minutes of activation, your app will have out-of-the-box protection against com...
Add Favorite
How to Catch Advanced Persistent Threat...
View this on-demand webinar to hear Richard White, Cyber Security Architect from Tennessee DOT, and Val Bercovici, CEO and Co-founder of Chainkit, explain how the Department of Transportation's solution architecture and Chainkit's eXtended Integrity Monitoring (XIM) platform overcomes the critical integrity gap, protects all systems and data from a SolarWinds-style attack, and reduces DOT's cyber liability premium by 80%. In this on-demand you...
Add Favorite
How to Catch Advanced Persistent Threat...
Join Dr. Richard T. White and Robert D. Long of Tennessee Department of Transportation's Cyber Security Team on how they secure of the Top 5 highway systems in the U.S. against advanced persistent threats (APTs) and ransomware attacks. Richard and Robert will be interviewed by Val Bercovici, CEO and co-founder of Chainkit about the their new architecture and highlights published in their new technical paper: Secure Connectivity for Intelligent...
Add Favorite
Cybersecurity Executive Order Challenge...
The recent ransomware attacks on software supply chains have highlighted the need for improved national cybersecurity efforts. The Executive Order on improving the nation's cybersecurity emphasizes the reality that federal agencies are equally exposed to cyber threats as commercial organizations. Register now for Micro Focus' webinar on the Cybersecurity Executive Order Challenges and Strategies. In this webinar, Senior Cybersecurity Executive...
Add Favorite
Protect and Enhance your DNS Security P...
Join this Infoblox webinar to discover why it's critical to protect your DNS infrastructure, how to protect DNS, and how to use DNS to improve your existing layered security approach. The training will address the most common challenges organizations face to mitigate DNS security threats. Attendees will learn how modern DNS security threats circumvent typical security architecture and why DNS-specific security controls are needed today. Infobl...
Add Favorite
Learn How 5 Steps Can Mitigate Ransomwa...
According to Ponemon, 88% of public sector organizations have experienced at least one cyber-attack in the past two years. Why? This is because public sector organizations offer an abundance of sensitive data for hackers including social security numbers, confidential health and finance records, and valuable intellectual property. The number of hacking, ransomware and cybercrime events continues to grow. Are you prepared? Join Otava, Veeam, an...
Add Favorite
Ransomware Got You Worried? Refresh You...
Join Secureworks and Carahsoft for a virtual happy hour and webinar featuring two pros, Rob Lelewski and Erin Petrey. Rob Lelewski, Director of Proactive Incident Response Services at Secureworks, will provide some best practices and proactive measures your team can take to prepare for the inevitable ransomware attack. His discussion will focus on common shortcoming that are regularly observed both in the emergencies that the Secureworks incid...
Add Favorite
Back to Search Begin New Search