Back to Search Begin New Search Save Search Auto-Notify
Application Security from the Cloud wit...
As your agency increasingly engages constituents, employees, and contractors through web and IP-based applications, web application security must be a critical priority. Attackers know that disrupting web applications can result in significant loss of important and sensitive government data. To prepare for the inevitable attacks, you need application security solutions that deliver fast and effective protection in order to safeguard your infra...
Add Favorite
Ransomware: The Cyber Warfare Attack To...
Ransomware attacks are on the rise, with at least 22 reported breaches of public sector networks in 2019 alone. Popular targets are cities, police stations, and schools, and the attacks can tally up millions of dollars in recovery costs. This situation is likely much worse, as many ransomware attacks are unreported. Public sector organizations are typically understaffed and underfunded, making them ripe targets for malicious actors intent on c...
Add Favorite
Business Continuity in Uncertain Times:...
If you are experiencing remote work performance or availability problems, than the scale and reliability of a cloud solution may ease your burden. Akamai's Enterprise Application Access (EAA) solution can provide access to critical applications no matter where they are hosted, maintain the continuity of agency's core functions, and leverage a Zero Trust approach to maintain security. Join Akamai and Carahsoft for a discussion on how your busi...
Add Favorite
Find the Malicious Code Hiding on Your...
80% of web pages contain at least one third party library security vulnerability. Script threats like web skimming, formjacking, and Magecart attacks can steal data from visitors to your website. Content from third party sources are increasingly becoming major attack vectors for script attacks, which take advantage of compromised web tools you need. Join Akamai and Carahsoft for a complimentary webinar on June 24th to learn how you and your ag...
Add Favorite
Ransomware Protection: Reducing the Imp...
There is no shortage of options to consider for improving your organization's security posture. As novel ransomware techniques continue to proliferate, choosing the most effective project to prioritize is critical. Choosing correctly means weighing the efficacy, effort, and cost to determine which has the highest value in buying down ransomware risk.Join us as Garrett Weber, Director of Solutions Engineering at Akamai (previously at Guardicore...
Add Favorite
Ransomware Decrypted: Using Microsegmen...
There is no shortage of options to consider for improving your organization’s security posture. However, public sector IT budgets can quickly narrow possible actions. Doing more with less while trying to hold back the explosive growth of novel ransomware is a task that has been assigned to leaders across the country. Choosing the right path means weighing risk against efficacy, effort, and cost. There is no silver bullet to put down the...
Add Favorite
It's All About the Brand: Keeping Your...
In the 3rd quarter of 2021, the healthcare industry hit an unfortunate milestone of recording at least one ransomware attack against a healthcare facility every single day. The healthcare sector's widespread use of legacy devices and massive amounts of stored Protected Healthcare Information (PHI), makes the industry an environment ripe for threat actors. As the industry emerges from the shadow of the COVID-19 global pandemic, healthcare and p...
Add Favorite
It's Not the Breach. It's the Spread: I...
This session explored the critical role of cyber resiliency in helping organizations withstand and recover from today's evolving threats. We dove into strategies for reducing attack surfaces, visualizing networks, and securing critical IT assets – while also examining how compliance regulations can enhance security and safeguard sensitive data. During this webinar, attendees:Gain actionable insights to strengthen their security postureLe...
Add Favorite
It's Not the Breach. It's the Spread: I...
This session explored the critical role of cyber resiliency in helping organizations withstand and recover from today's evolving threats. We dove into strategies for reducing attack surfaces, visualizing networks, and securing critical IT assets while also examining how compliance regulations can enhance security and safeguard sensitive data. During this webinar, attendees:Learn how to minimize vulnerabilitiesGain actionable insights to streng...
Add Favorite
Back to Search Begin New Search