野花社区

  • Resource: Prevent Encrypted Threats and Data Loss with Inline SSL Decryption

    Read this whitepaper to learn about the benefits and challenges of some of the most common approaches available to inspect encrypted traffic and about a new technology from Gigamon that delivers an advanced inline SSL/TLS decryption solution that fosters greater network visibility.


    • Gigamon, Cybersecurity
  • Bob Osborn, Chief Technology Officer of Federal for ServiceNow, discusses how agencies can take advantage of cloud in a secure way and reduce the time it takes to deliver mission critical services by accepting and using a hybrid, multi-cloud approach.


    • ServiceNow, Cybersecurity
  • Gary DePreta, the Area Vice-President for Defense, Intelligence and Aerospace at Splunk, discusses how challenges can be reduced if agencies and organizations better understand the data around their cyber threats and vulnerabilities.


    • Splunk, Cybersecurity
  • Speed up Decision-Making Capabilities with Splunk

    Gary DePreta, the Area Vice-President for Defense, Intelligence, and Aerospace at Splunk, explains why agencies need to speed up their decision-making capability when protecting their networks and systems.


    • Splunk, Cybersecurity
  • A Holistic Perspective of Cybersecurity Data

    Gary DePreta, the Area Vice-President for Defense, Intelligence, and Aerospace at Splunk, discusses why cybersecurity data needs to be understood from a more holistic perspective.


    • Splunk, Cybersecurity
  • Weathering the Cyber Storm

    Read about the evolving efforts agencies are taking to combat cybersecurity challenges and protect their systems.


    • All, Cybersecurity
  • Evolving Your Security Posture

    Read how automation and orchestration are integral to maturing your cyber security program as written about by Chris Usserman.


    • Cybersecurity , Infoblox
  • Breaking the Cycle of Cyber Breaches

    Read about how finding the right mix of security tools requires flexibility and a focus on the outcomes, written by Akamai's Senior Director of Global Security Strategy, Patrick Sullivan.


    • Cybersecurity , Akamai
  • Cyber is a Data Problem

    Learn how agencies can outsmart cyber threats with the help of machine intelligence as written by Barry Leffew, Senior Vice President and General Manager of National Security Services.


    • SAP NS2, Cybersecurity
  • Zero Trust and the Quest for Cloud Security

    Hear about why the government needs to combine the power of FedRAMP and TIC to build trusted environments in the cloud from Stephen R. Kovac, Vice President of Global Government and Compliance at Zscaler.


    • Cybersecurity , Zscaler
  • Executive Viewpoint with Dominic Cussatt

    Read about how Veterans Affairs is creating a resilient cyber security ecosystem from chief information security officer Dominic Cussatt.


    • All, Cybersecurity
  • Resource: Who is SAP NS2?

    This YouTube video explains who NS2 is and how it functions as a wholly owned subsidiary of SAP America, Inc.


    • SAP NS2, Cybersecurity
  • GCN Report: The Next Wave of Cybersecurity

    Learn how government agencies are navigating through the increasingly treacherous sea of cyberthreats using emerging tools and tactics.


    • All, Cybersecurity
  • Resource: Mission Possible: Protecting Federal Users Anytime, Anywhere

    This whitepaper discusses how enabling TIC-in-the-Cloud provides secure, policy-based access to applications and SaaS services for federal agencies.


    • Cybersecurity , Zscaler
  • Dan Carayiannis, the Director of Public Sector at RSA, talks to Jason Miller, Executive Editor at Federal News Radio, about an emerging concept across both the public and private sectors where organizations are focusing on digital risk management


    • RSA, Cybersecurity