Back to Search Begin New Search Save Search Auto-Notify
F5 Red Hat Tech on Tap
Application and API security are rapidly evolving. Faced with new challenges that span traditional on-premise data centers, distributed multi-cloud environments, and legacy versus modern application deployments, the DoD requires flexible solutions to rapidly address a surging attack vector and an expanding threat landscape. On this Tech on Tap tour stop, we focused on these new security threats and provided you with real-world examples of some...
Add Favorite
Register Now: The Role of IAM in Zero Trust
Attendees joined Okta's Field CTO, Public Sector on August 21st for a webinar discussing The Role of IAM in Zero Trust. Zero Trust may be a buzzword for security leaders today, but there’s still a ton of relevancy in core Zero Trust principles. Okta discussed moving beyond the buzzword and repeated messages that fall short in providing a clear and concise path forward. For security practitioners who strongly advocate for Zero Trust, we...
Add Favorite
How Infoblox Supports Public Sector Networks
During our 30 minute demo Infoblox-Certified Demo Jock, attendees learned how Infoblox can provide a smarter and more efficient way to manage and protect their network. Our presenter discussed:The impacts on security that arise from evolving IT architecturesHow to leverage your current foundational infrastructures, including DNS, DHCP, and IPAMAdvantages of actionable network intelligence that provides valuable insights on threats and incident...
Add Favorite
Evolving Talent Management to Build the...
The skills needed within the federal workforce are evolving, and the way we recruit, train, and support employees must change to support workforce and mission needs. Attendees joined us for a discussion on how to successfully support skills-based hiring and employee career growth by using ServiceNow to capture and maintain skills for re-skilling and up-skilling. The conversation started with ServiceNow experts discussing today’s ever-cha...
Add Favorite
SAS Viya on Red Hat OpenShift: Analytic...
Red Hat and SAS hosted a webinar on Thursday, August 22nd, for insights on how their integrated solution helps enterprise IT organizations build and scale analytics on a stable infrastructure and operationalize analytics to get models into production quickly.For more information on Red Hat & SAS's collaboration, please view the resources below:Solutions Brief: Analytics in the Hybrid CloudWebsite: Trusted Decisions With SAS Viya on Red Hat...
Add Favorite
Cryptography Simplified: Addressing the...
Cryptography is everywhere. As a key security control that enables privacy, security, and trust in our digital world, it is highly regulated. Yet, after years of being a somewhat sleepy topic in the cybersecurity world, cryptography is now a hot topic in the Public Sector for at least two reasons. First, ongoing migration from FIPS 140-2 to FIPS 140-3 is generating waves of activity to comply with the new NIST standard. As an even larger chall...
Add Favorite
GovCon - Summer Shorts - M&A
COMPLIMENTARY + RECORDED WEBINAR SERIES Join Jennifer Schaus & Associates in this 2 WEEK Special Webinar Series, 2024. Guest Speakers will cover various topics in federal contracting and touch on three main areas:Best Practices - Avoiding Pitfalls - FAQ's - and then take your live questions. COMPLIMENTARY & RECORDED WEBINAR SERIES Tell a friend or colleague!
Add Favorite
Securing the Gateway: Mastering API Sec...
In this session, MuleSoft discussed the importance of securing APIs and shared practical tips and strategies for keeping your APIs safe from cyber threats. Attendees gained insights into industry-leading practices and recommendations to safeguard their APIs from unauthorized access and other potential risks to securely scale their API catalog through standardization, community, and monitoring. watch the on-demand recording to learn about ways...
Add Favorite
Value Streams in the Atlassian Ecosystem
Process inefficiencies and communication barriers hinder government agencies from delivering effective public services. As data complexity increases, visibility delays will only worsen. In Atlassian's webinar on August 27th audiences discovered possible delays in their workflows by exploring topics such as:Enhancing operational efficiency with data integrationData security and privacy in public sector analyticsBest suited tools to streamline w...
Add Favorite
A Proactive Approach to Defend Your Endpoints
90% of organizations experienced at least one identity-related security incident in the past year. Attackers are increasingly targeting identities and exploiting privileged access to gain a strong position in your environment, bypassing the work of EDR and traditional endpoint defenses. How can security teams take a proactive approach to defending their endpoints? Watch the on-demand recording for a Tech Talk and Live Demo to learn why managin...
Add Favorite
Back to Search Begin New Search