Back to Search Begin New Search Save Search Auto-Notify
Take Control of Your Data Landscape Wit...
Wrangle your agency's data through automated governance with Collibra Data Governance. Nearly any organization today can understand the immense value data brings to their agency. However, there is a difference between data and data that is trusted and usable. The bottom line: data that isn’t understood or trusted is useless. Collibra Data Governance takes the guesswork out of what data means and whether it can be trusted by automating go...
Add Favorite
Navigating FedRAMP: Understanding Recen...
Since its inception in 2011, the Federal Risk and Authorization Management Program (FedRAMP) has played a vital role in the U.S. government's cloud security strategy, providing a standardized risk-based approach for assessing, authorizing, and continuously monitoring cloud products and services used by federal agencies. Recently, NIST Special Publication (SP) 800-53, Revision 5 was published to represent the new generation of security and priv...
Add Favorite
Better Predict and Understand Vulnerabi...
Urban flooding poses risks to residents, property, and infrastructure, and disrupts urban services. Hydraulic simulations help engineers to better predict and understand vulnerabilities like water velocities, depth, and floodwater extent. That understanding leads to more resilient drainage systems and more consistency maintaining utility service. OpenFlows SewerGEMS has long offered fully dynamic, 1D analysis capabilities to help engineers des...
Add Favorite
Discover New Adobe Connect Features for...
With the ongoing shift to hybrid work, many organizations have turned to Adobe Connect to extract the unique capabilities that this versatile platform has to offer. Adobe Connect has made it even easier to engage with your attendees thanks to some brand-new tools designed to enhance the virtual experience and to allow for richer personalization. Watch this on-demand webinar to acquire knowledge on how these new tools work and how to better int...
Add Favorite
Empowering your workforce: Strategies f...
Learn how to roll out a successful Cybersecurity Awareness Month program that boosts employee engagement all October (and beyond). Join Infosec’s Emma Waite and Camille Raymond to learn: What employee-related risk data is needed to quantify success How to communicate your NCSAM plans to stakeholders The content and cadence appropriate to drive engagement Creative ways organizations are celebrating NCSAM How to continue the momentum after...
Add Favorite
Tips, Tricks, and New Features to Ampli...
Architectural designer and SketchUp Customer Success Manager Kyle will teach the best ways to ramp up your SketchUp modeling workflow. Learn how to best take advantage of SketchUp’s extensive and powerful toolset, regardless of your industry or SketchUp expertise. Watch this on-demand webinar to discover how SketchUp has limitless possibilities to generate designs. Follow along with Kyle as he showcases his preferred methods for increase...
Add Favorite
Enhance Google Workspace Functionality...
In this on-demand webinar, attendees learned how: BCE solves not just data in flight but also data in motion challenges. You can either augment or even replace traditional VPN technologies. Decrease operational costs of securing a distributed workforce.
Add Favorite
Getting Started with the Service Mesh
Tetrate and Venafi came together for a hands-on workshop focused on service mesh fundamentals and how it addresses the issues of security, observability, traffic management and high availability for microservices-based applications. Whether you are a developer, DevOps engineer, an IT or Security professional, this workshop was designed to equip you with the foundational knowledge, diving into the core concepts of service meshes including sidec...
Add Favorite
Tenable Active Directory Master Class
In this on-demand workshop, Tenable focused on the nuts and bolts of Active Directory and how best to secure it. Session highlights included: Domain controllers and FSMOs, AD/Windows Security Model, PowerShell and Active Directory overview tips, and more!
Add Favorite
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
Back to Search Begin New Search