Back to Search Begin New Search Save Search Auto-Notify
Don't Get Blindsided by Mobile Gaps in...
Mobile application security is a real threat-vector. Whether you are managing existing mobile apps or building your own, the need to test them for vulnerabilities on a regular basis is now more critical than ever. From the Executive Order to FISMA compliance, the requirement to include mobile app vetting is now upon us. Software supply chain risk management for mobile applications, from large MDM systems to only a handful of 3rd party created...
Add Favorite
Real-Time AI Processing at the Edge
When time is of the essence in our federal government, AI can power real-time insights at the edge where data is collected. However, challenges persist among those in the field who are unable to reduce large model architectures to run on smaller devices, ensure security, bridge skills gaps, and enable orchestration back to a centralized solution for monitoring and retraining as needed. Join Modzy for a practical on-demand demo of AI-Powered pr...
Add Favorite
Tackle Application Modernization with V...
VMware, Sterling, and Carahsoft invite you to a workshop where you'll learn: All about the rise and proliferation of Kubernetes & how they can revamp your applications How VMware Tanzu, when combined with VMware vSphere, can enable enterprise-wide Kubernetes to take the headache out of infrastructure modernization efforts How to use our suite of VMware application management products through a user-friendly dashboard designed to give you c...
Add Favorite
FASTTR on AWS: Reduce the Time and Cost...
In this informative webinar you will learn about Continuous ATOs (cATO), using OSCAL for creating digital SSPs and implementing strong Continuous Monitoring controls, as well as: Dedicated government landing zone compliant with FedRAMP and DOD/DISA requirements Pre-audited NIST compliant security services for FedRAMP Moderate, High, JAB, DOD IL-5 and U-NNPI compliance ATO ready package using OSCAL
Add Favorite
Security vs. Compliance: Can You Have Both?
Tired catchphrases such as "Compliance is not security", "You can't protect what you can't see" and "Cyber must speak the language of the business" abound in our industry, with numerous conversations focused on the problem. Given the rise of the API-centric economy, the time has come to end the debate once and for all around Security vs. Compliance Our panel of thought leaders shared best practices around: How to bridge the divide between secu...
Add Favorite
Splunk & Blockchain
Blockchain is more than a transactional database of critical data. Once data is committed onto a blockchain, it is permanent and nearly impossible to manipulate or hack. As such, businesses can operate more efficiently and securely. Businesses are turning to blockchain to solve a wide range of problems including:Quality AssuranceAccounting Contract ManagementSupply Chain ManagementData Protection and an indisputable trail of transactionsIn thi...
Add Favorite
10 Tips to Perfect Public PDFs
Join our complimentary webinar to learn how to quickly improve the readability and reliability of your PDFs for optimal user experiences with improved security, compression, and searchability features. Specifically, this webinar will explore: Security Tips – remove sensitive metadata, prevent unwanted changes, and learn about sanitization. Readability and Reliability Tips – provide automatic bookmarks, make documents searchable, an...
Add Favorite
What does Zero-Trust Mean to SLED Cyber...
Join Mitch Rosen, Global Director of Solutions Engineering, as he discusses how CISA and OMB's ZTA pillars directly align to ongoing modernization and security priorities of state, local, and educational institutions. In this webinar, topics will include: What are the Zero-Trust pillars and why are they important? How do you augment existing processes with Zero-Trust architecture? As SLED organizations improve their cybersecurity posture, how...
Add Favorite
The Federal Healthcare Threat Landscape...
Join us for this intel and training perspective with Proofpoint. Agenda: Overview of the current Federal Healthcare threat landscape and Q1 2022 analysis - including Conti, Emotet, COVID-19, Credphish, and everything in between Current Federal Healthcare attacks and lures, and what to do about them - threat intelligence to support IT/messaging, security teams, and focused high-payoff security awareness training Conclusion and wrap-up - recomme...
Add Favorite
Splunk & Carahsoft Virtual Workshop
Curious how Splunk can further help your organization? Join us for our informative, hands-on virtual workshops where your IT teams will have the opportunity to increase the level of Splunk skillsets across your organization. Date & Time Session Tuesday, April 26th 11:00am ET; 8:00am PT 30 minutes Tips & Tricks: Some of the best resources and shortcuts we've found to get the most out of Splunk after working with it for a year. Tuesday,...
Add Favorite
Back to Search Begin New Search