Ұ

  • Cybersecurity Starts with Visibility

    Learn why a pervasive view into far-flung networks is essential, and next-generation packet brokers can help achieve this visibility from Dennis Reilly, Vice President of Federal at Gigamon.


    • CMMC, Cybersecurity , Gigamon
  • Deb Snyder: Six Ways to Enhance Cybersecurity in a Post-Pandemic World

    Deborah Snyder, former CISO for the New York State Office of Information Technology Services, shares her thoughts on key steps state and local government agencies can take to improve cybersecurity in a post-pandemic environment.


    • Cybersecurity , All
  • The Importance of Privileged Access Security

    Agencies need targeted solutions to prevent hackers from compromising high-level credentials.


    • Cybersecurity , CyberArk
  • Assessing and Managing Cyber Risk

    As organizations evolve and their reliance on technology increases, securing the enterprise becomes more complex. Robert J. Carey, Vice President and General Manager of Global Public Sector Solutions at RSA, explains how a business-driven approach helps state and local agencies manage risk.


    • RSA, Cybersecurity
  • A Unified Approach to Visibility and Security

    Bill Rucker, President of Trustwave, explores how the growing complexity of IT environments and threats demands a single view into all resources.


    • CMMC, Cybersecurity , Trustwave
  • Attackers Target Government

    GovTech's research team details the trends behind how the public sector is adapting to the increasing scale and impact of cyber attacks with new tools and growing cybersecurity sophistication.


    • CMMC, Cybersecurity , All
  • Executive Viewpoint: A Conversation with Suzette Kent

    Federal CIO Suzette Kent discusses how the government's new data strategy informs cybersecurity, emerging technology and citizen services.


    • All, Cybersecurity
  • The Case for Open, Data-Driven Cybersecurity

    Agencies are turning to data-rich ⁠— and often open source-based tools ⁠— for security insights.


    • All, Cybersecurity , Corelight
  • GovLoop Guide: Your Guide to Mission-Driven Security

    This guide, created by Carahsoft and GovLoop, explores how how FedRAMP, CDM and TIC are evolving and how they will shape future federal cybersecurity efforts. Featuring insights from leaders at CISA, DHS and GSA and Carahsoft's technology partners.


    • Multicloud, CMMC, Cybersecurity , All
  • 3 Ways to Strengthen Cybersecurity as Technology Evolves

    Government Technology talks to Dan Lohrmann, former Michigan State Chief Security Officer and one of the nation’s leading cybersecurity experts, about how to confront evolving threats.


    • All, Cybersecurity
  • Leaders In Innovation: Identity and Access Management Executive Brief

    Learn from leaders at U.S. Citizenship and Immigration Services, Cybersecurity and Infrastructure Security Agency, U.S. Army, Department of Defense, General Services Administration, and the National Institute of Standards and Technology on how they're tackling the challenges and reaping the benefits of identity and access management. Featuring additional insights from technology leaders at RSA.


    • Cybersecurity , RSA
  • How to Build Stronger Security Teams

    Steve Moore, Chief Security Strategist of Exabeam, discusses how frontline security practitioners can thrive with the help of machine learning and executive sponsors.


    • Cybersecurity , Exabeam
  • Merging Cybersecurity and Modernization

    FCW's research team details the trends and figures behind the overlap between government’s route to IT modernization and its pursuit of flexible yet comprehensive strategies for securing its systems.


    • All, Cybersecurity
  • Leaders In Innovation: Identity and Access Management Interview

    Robert Carey, Vice President & General Manager for Global Public Sector Solutions at RSA, and Steve Schmalz, Field Chief Technology Officer of Federal Group at RSA, discuss the latest developments in identity and access management with Federal News Network’s Executive Editor Jason Miller.


    • Cybersecurity , RSA
  • Steering a Course Through Stormy Cyber Seas

    Agencies continue to be buffeted by cybersecurity challenges, but successful solutions are emerging.


    • CMMC, Cybersecurity , All