Back to Search Begin New Search Save Search Auto-Notify
F5 BIG-IP Next - Explore the Next Gener...
Attendees joined F5 and Iron Bow at Rocket City Tavern on Tuesday, June 18th for a hands-on lab featuring BIG-IP Next.All BIG-IP users were invited to this personalized training on BIG-IP Next, F5’s Next Generation Platform. During the session, attendees received a first look at the BIG-IP Next platform while going through application deployment exercises to address load balancing, application security, and app access use cases.During th...
Add Favorite
Tackling the Elusive Non-Employee Problem
In the realm of state, local, and higher education institutions, manually managing access for non-employees can create significant challenges. Lack of visibility and control over non-employee identities such as contractors, researchers, visiting faculty, partners, vendors, and other external collaborators is time-consuming, error-prone and leads to security vulnerabilities and compliance risks. Without a comprehensive identity security solutio...
Add Favorite
Steering Through Complexity: Grasping C...
Attendees of this webinar joined Nick Mistry, Lineaje's Chief Information Security Officer (CISO) and Scott Armstrong, Interos Industry Principal, for an illuminating webinar on the critical subjects of C-SCRM (Cyber Supply Chain Risk Management) and SBOM (Software Bill of Materials) vulnerability information. The speakers dove into the intricacies of specific policies and key regulations impacting cybersecurity, including Executive Order 1402...
Add Favorite
5 Easy Wins to Achieving Zero Trust in...
Orca Security, in collaboration with GuidePoint Security hosted this insightful webinar on June 18, 2024. Attendees listened in as Neil Carpenter, Elizabeth Sims and Chris Romero delved into the challenges and solutions for achieving Zero Trust in the cloud. Hear insights revolving across the key pillars:DataAutomation and OrchestrationGovernanceIdentities and EntitlementsApplication and Workload
Add Favorite
Why MDR Requires a Holistic, Cost-Effic...
Splunk is a leader in security and observability, with customers of all shape and sizes that leverage flexible sizing models, free toolkits, and best-in-class network monitoring data management. Attendees joined us to gain insights into:The growing threat landscape for school districts and municipalitiesCritical factors to consider when choosing an MDR solution providerExtracting deeper security value from your systems and security log dataDev...
Add Favorite
Multi-Layered Identity Authentication f...
As fraud actors increase their operations in velocity and capabilities, especially with the use of emerging technologies as the weapons of choice, you and your citizens are at risk of becoming a victim. Are you able to rapidly and at scale, confirm who is behind the keyboard? If the answer is no, then this webinar is for you. It will help you in solving your identity authentication challenges, diminishing a fraudster's success. Our esteemed sp...
Add Favorite
Unmasking Cyber Shadows: Enhancing Cybe...
Meet a powerful ally in the world of Cybersecurity: Constella Intelligence's Deep OSINT investigations fueled by AI, it taps into the world's largest breach data lake collected from the surface, deep and dark web.Join us to learn how agencies can leverage deep OSINT to:Disrupt crime at its source by uncovering synthetic Identities Conduct cybercriminal identify graphing to unveil threat actors at the individual level Achieve greater scalabilit...
Add Favorite
From Legacy to Leading Edge: Embracing...
As organizations pivot towards digital-first strategies, the imperative to adopt scalable and flexible identity frameworks has never been more critical. In an increasingly interconnected world, it is crucial for organizations to build a resilient identity architecture that not only supports current needs but anticipates future demands. CyberArk and UberEther explored the transformative journey from traditional, on-premises identity management...
Add Favorite
Back to Search Begin New Search