Back to Search Begin New Search Save Search Auto-Notify
The Anatomy of a Ransomware Event: Awar...
Arete is transforming the way organizations prepare for, respond to, and prevent cybercrime. Our team responds to thousands of ransomware incidents and helps organizations get back up and running after attacks. By collecting data from these incidents, we create unparalleled insights into the ransomware landscape. We focus on security so you can focus on serving your customers and communities. Ransomware is a threat to businesses, governments,...
Add Favorite
The Business of Ransomware
Did you know there’s an entire underground economy around ransomware? In this webinar, Halcyon explained how Ransomware-as-a-Service (RaaS) groups operate, what an affiliate is, and how Initial Access Brokers (IABs) are the glue that holds them all together. The ransomware economy constantly changes, with groups disbanding or taking market share from competitors from quarter to quarter. Who will be crowned top dog in 2023? What you got o...
Add Favorite
Risk, Issue, and Opportunity Management...
How can ServiceNow help end-users comply with the DoD’s Released Management Guide, “DoD Department of Defense Risk, Issue, and Opportunity Management Guide for Defense Acquisition Programs”? During this session, we discussed how customers can both mitigate risk in portfolio management, as well as adhere to the requirements of the Management Guide - all in real-time (as opposed to accessing risk during a project postmortem ass...
Add Favorite
Forescout XDR Demo Desk
At this demo desk, we discussed the following key capabilities of Forescout XDR in-depth: Data Ingestion for more than 170 vendor and EDR-agnostic sources including: security, infrastructure, enrichment, applications and Cloud/SaaS sources. How the Threat Detection Engine applies five detection techniques to automatically generate high-fidelity, high-confidence true threats that warrant investigation while weeding out false positives. Full Spe...
Add Favorite
Automated, Intelligent Data Estate Mode...
During this webinar Impetus Technologies, AWS, Carahsoft covered innovative strategies to modernize data platforms to a modern cloud-native architecture for your agency. LeapLogic, Impetus’ cloud accelerator for extract, transform, and load (ETL), data warehouse, Hadoop, and analytics modernization, makes it possible to take on a sizeable transformational migration journey. Having successfully handled many migrations, LeapLogic’s t...
Add Favorite
Secure Applications and Data to Prevent...
Data security is always of utmost concern; today, we're reimagining security for a hybrid cloud future. Many traditional infrastructure stacks are comprised of products from multiple vendors, each decoupled from the stack, providing a narrow and limited view of security. Validating and maintaining a security baseline through continuous software upgrades is time-consuming and often involves error-prone manual processes that take away from innov...
Add Favorite
Operationalizing Zero Trust with Deep O...
Network blind spots prevent Zero Trust deployment from being successful due to the lack of visibility into network telemetry. As the network grows and evolves, this pain will worsen if not addressed at the foundational level. Gigamon Deep Observability ensures your tools and Zero Trust policy engine have access to all network-based communications in your organization. For any effective Zero Trust implementation, full network visibility and eli...
Add Favorite
Deliver Secure Hyper-Converged Infrastr...
With the growing number of digital transformation initiatives, hyper-converged infrastructure (HCI) has emerged as a simple, cost-effective solution. However, as HCIs amass large volumes of data across distributed resources, security compliance becomes a critical factor when protecting data at rest in an HCI. View this 60-minute webcast to learn how you can work with VMware and Thales TCT to deliver secure hyper-converged infrastructure soluti...
Add Favorite
TechNet Cyber 2023 Webinar Series: Prev...
Proofpoint and Carahsoft invited individuals and their cybersecurity teams to join them in an overview of TechNet Cyber 2023. Attendees learned how Proofpoint's people-centric solutions can improve current and future cyber threats. At the end of February, CISA released a Red Team analysis report that highlighted the need for agencies and organization to detect lateral movement techniques, train users on how cybercriminals leverage human-based...
Add Favorite
Leveraging Open-Source Geospatial Servi...
Open-source geo software is commonly used to move massive spatio-temporal data from sensor to end user applications with low latency. The importance of this is exemplified in emergency management/response applications, such as hurricane tracking and modeling, real-time flood, and wildfire applications. The next step for government emergency managers is to know where to find training and support for these open-source geo software applications i...
Add Favorite
Back to Search Begin New Search