Back to Search Begin New Search Save Search Auto-Notify
Establishing Boundaries in Today's Data...
Attendees of this on-demand webinar explored the intricacies of establishing and managing boundaries within data centers and IT infrastructure, which is crucial in the era of Zero Trust.
Add Favorite
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
Solving Investigations with Social Media Data
With new data sources popping up every day, investigators need to constantly evolve to keep up with new data in their investigations. However, with the overwhelming amounts of new data, it's become increasingly difficult for investigators to sort through and link all the individual data points. Watch this on-demand webinar to learn from OSINT expert, Nico Dekens, who provides a detailed account of his experience using social media data and OSI...
Add Favorite
Empowering Public Safety Agencies with...
Public safety agencies face the formidable challenge of efficiently analyzing and leveraging extensive volumes of data. With the ever-increasing complexity and quantity of information available, these agencies require a robust solution to effectively harness the potential of their data resources. This on-demand webinar explored how Tableau has emerged as an invaluable tool that equips public safety agencies with the capabilities to unlock hidd...
Add Favorite
Introduction to Advanced Analytics with...
Join Alteryx for an interactive session on conducting end-to-end analysis. To start off, we will unpack how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, you'll go hands-on and learn how to apply these techniques for yourself. You will learn how to bring in and merge differe...
Add Favorite
DevSecOps: A Shift Left for Security an...
The success of federal agencies hinges on modernization. As such, a growing number of government programs are adopting DevSecOps methodologies but struggle to harness its full potential. With Atlassian's Jira Software and Confluence, agencies can make the most of their adoption by streamlining workflows and boosting agility. Join Atlassian experts on November 15th to explore: Use cases on federal agencies modernizing their systems using A...
Add Favorite
Leveraging Delinea Server PAM for Smart...
Smart cards provide an enhanced level of security for Linux computers when users log on to Active Directory domains. If you use a smart card to log on, authentication requires a valid and trusted root certificate or intermediate root certificate that can be validated by a known and trusted certification authority (CA). Because smart cards rely on a public-private key infrastructure (PKI) to sign and encrypt certificates and validate that the c...
Add Favorite
Building an AI-Ready Lakehouse From Sta...
In a world where generative AI delivers new possibilities for transformational results, organizations often overlook the important role data pipelines and platforms play in training, retraining, deploying, and hosting the right ML models to generate powerful AI results. Join Mike Gualtieri, VP & Principal Analyst at Forrester Research, and experts from Cloudera and Intel, for an in-depth discussion on the unique capabilities of a modern op...
Add Favorite
Shifting from Service-Centric to Person...
In the realm of government leadership, the transition from a service-centric to a person-centric approach is not just a trend but a necessity. As government leaders, you play a pivotal role in shaping the future of local agencies and our communities. Join us for a complimentary webinar designed specifically for government leaders to delve into the transformative power of adopting a person-centric approach in the age of AI. Discover how this pa...
Add Favorite
Showcasing the Power of a Unified Secur...
Join us on November 15th for this CrowdStrike webinar where we will take a deeper dive into the benefits LogScale can provide security experts.
Add Favorite
Back to Search Begin New Search