Back to Search Begin New Search Save Search Auto-Notify
Modern Load Balancing with VMware NSX A...
Legacy hardware load balancers require tedious manual provisioning and management. They lack visibility to troubleshoot and resolve issues before user experience is impacted. Today's distributed application delivery solutions and cloud load balancers need to minimize application downtime and the complexity of maintaining multi-cloud environments. Agencies need more flexibility in deployment models for their on-premises and cloud applications w...
Add Favorite
Modernizing and Securing Legacy Applica...
Antiquated, monolithic applications are a persistent issue that can plague the most critical government services. Many lack the required levels of security, scalability and are difficult to maintain creating a bottleneck in the services provided to constituents. To enable a better, more secure path forward, teams are increasing their emphasis on IT modernization. GitLab, The DevOps platform can help your agency achieve its modernization object...
Add Favorite
Preventing Digital Identity Theft and Fraud
As the public embraces technology in their everyday lives, they want great digital experiences with the government. Local and state agencies are rapidly modernizing, but the transformation arrives with new opportunities for identity theft and fraud. However, with the right approach, agencies can deliver digital services effectively while mitigating risks. Modern identity technology makes it possible. View this on-demand webinar to explore toda...
Add Favorite
Ending Phishing Season: How State and L...
Phishing attacks are rising dramatically, particularly those aimed at state and local governments, with recent reports suggesting incidents have nearly doubled. Attacks have targeted a wide swath of the workforce—from revenue and tax officials to employees in elections and unemployment offices.The increased number of phishing incidents have moved beyond email to also target victims through social media, texts and other channels. Regardle...
Add Favorite
The Fundamentals of Application Securit...
As the nine time Gartner Magic Quadrant Leader, the Veracode team touched on the best practices that have assisted many of their existing customers during this four-part webinar series. Upon completion of all four parts you will be awarded a VeraTrack Education Certificate. In order to receive the certificate, you may either attend the live sessions, or view the on-demand recordings. Sessions included: Introduction to Application Security View...
Add Favorite
Best Practices for Securing Cloud-based...
In this presentation, Invicti Security Chief Product Officer, Sonali Shah, dives into the top five AppSec risks that every organization should be aware of and provides best practices for securing cloud-based web apps and APIs.
Add Favorite
Infoblox Federal Raspberry Pi Event - D...
View this on-demand webinar now to see how this workshop walked engineers through the conceptual abstracts of DNS security, and brought a hands-on demonstration to enable attendees to become advocates within their associated agency for securing DNS, by utilizing the Infoblox Security Solutions. Workshop Focus: DNS security Methodology of a DNS based cyber-attack Training on the fundamentals of DNS security Walking attendees through the genera...
Add Favorite
The Need to Build Collaborative Communi...
View this on-demand webinar session where you will learn from Travis Howerton (former NNSA CTO executive and current C2 Labs Co-Founder) and Salesforce. The focus of the webinar is on how secure cloud collaboration tools can dramatically improve research productivity and community collaboration at DOE labs. Don't miss out and learn how these two industry leaders will touch on lab modernization trends and how salesforce is adding value across t...
Add Favorite
Splunk & Zscaler for Security
The perimeter is what keeps attackers out of your systems, but with users, applications, and data moving outside of traditional boundaries the perimeter can no longer be tied to a single layer of security. In today's working environment, where employees are connecting from anywhere at any time, controlling that access is now more critical than ever. Join Splunk and Zscaler in this on-demand webinar as they share how a tightly integrated cloud...
Add Favorite
Continuous Security with GitOps
In the modern age of technology, DevSecOps is proving to be a differentiator to speed mission demands. As software becomes a critical component of your modern software factory, DevSecOps practices and methodologies can help improve the speed, security and resiliency. GitOps takes these practices and applies them to modern infrastructure automation. The ability to quickly and continuously create and destroy systems, be it in the cloud or on-pre...
Add Favorite
Back to Search Begin New Search