Securing K-12 Modern Learning Environme...
Join Palo Alto Networks' for a 3-part on demand webcast series that will explore the challenges of cybersecurity in K-12 education and explore the resources that are available to help prevent successful attacks. The digital evolution of K-12 education, which has been underway for some time now, continues to surge as schools and districts move forward in their quest to deploy new tactics. These include 1:1, bridging the homework gap, and empowe...
Customize Your eLearning Curriculum wit...
Adobe Connect provides a series of web service APIs, also known as XML-APIs, primarily known for their seamless integration capabilities with other systems, however, they can be used for so much more. Join us online to bust the myth that Adobe Connect APIs are solely used by developers and discover everything you can build with them. During this session, we will discuss the Adobe Connect XML-APIs and demonstrate how use them to develop custom...
Securing K-12 Modern Learning Environme...
Join Palo Alto Networks' for a 3-part on demand webcast series that will explore the challenges of cybersecurity in K-12 education and explore the resources that are available to help prevent successful attacks. The digital evolution of K-12 education, which has been underway for some time now, continues to surge as schools and districts move forward in their quest to deploy new tactics. These include 1:1, bridging the homework gap, and empowe...
Practical Advice for Implementing Zero-...
Data can be your most valuable asset or your biggest liability. Regardless of how it is stored or used, do you know who is supposed to have access to it or how they are accessing it? And how do you manage this risk? For example, according to a Ponemon Institute research report sponsored by Varonis, more than 62% of employees have access to data they should not. That's what Virtru seeks to address. Virtru believes you shouldn't have to choose b...
Cipher Summit 2019
Save the date for our SafeNet AT 2019 Cipher Summit! Attendees will hear from their peers, industry pundits, and technology experts about the current federal cyber security landscape and learn about the solutions needed to help solve the most pressing security issues.This one-day event will also feature technical sessions designed to help SafeNet AT customers' better leverage their current solutions and provide a forum for interactive discussi...
Google Cloud October Webinar Series: As...
Join Google Cloud and Carahsoft for a deep-dive webcast on VM Migration. We plan to walk you through what an assessment of your on-prem environment would look like, how we do the assessment, and the immediate value you get out of it. From there, we will go in-depth on some customer scenarios that have already gone down this path with us. We will discuss how those customers chose to first adopt the cloud, based on their business needs and chall...
McAfee's New Capabilities for NIH Webinar
National Institutes of Health’s mission is to seek fundamental knowledge about the nature and behavior of living systems and the application of that knowledge to enhance health, lengthen life, and reduce illness and disability. They have identified Cyber Security as a key, strategic initiative needed to protect the personal information of the customers they serve. NIH desires an industry-leading platform approach that offers scalability,...
Web Application Firewall (WAF) and DDoS...
Join F5 Networks and Carahsoft for a webinar where we will discuss how your organization can deploy managed security services for every application, anywhere, without upfront investments in IT infrastructure and support. With F5's fully-managed Web Application Firewall (WAF) and DDoS Protection services, you'll be protected against the 10 most common web application attacks, malicious bots that consume valuable resources, and DoS attacks.F5's...
Crimeware via Email: Recent Trends and...
Destructive and criminal malware attacks are continually finding new ways to evade security defenses. ReversingLabs has thorough experience in analyzing these threats. Join our webinar and discover recent malware threats, how they remain undetected, and how you can strengthen your security environment with increased confidence in your detection. We will show you how you can reduce the time to identify and respond when trouble hits. During this...
Get Ahead of Ransomware with Splunk & AWS
From medical record systems to public transportation infrastructure, the onslaught of recent ransomware attacks has upended organizations around the world. Although a security issue, the fast propagation and business-impacting nature of these attacks shows that ransomware is a greater concern that affects all of IT.How can you better prepare and respond to such threats?Join us and learn how to apply broader analytical approach and data-driven...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.