野花社区

  • Balancing Artificial and Human Intelligence

    To block increasingly stealthy adversaries, agencies need machine learning and human expertise.


    • Cybersecurity , Exabeam
  • Executive Viewpoint: Kerry Long

    IARPA Manager Kerry Long discusses how the organization is using cloud technologies to evolve security.


    • All, Cybersecurity
  • Executive Viewpoint: A Conversation with Tonya Ugoretz

    Tonya Ugoretz, Deputy Assistant Director for the Cyber Readiness, Outreach and Intelligence Branch at the FBI, discusses how the bureau helps government and industry protect themselves from cyberthreats.


    • Cybersecurity , All
  • The Value of Threat Intelligence

    One of the most effective uses of threat intelligence is to stay on top of system vulnerabilities.


    • Cybersecurity , Recorded Future
  • Rethinking Security in The Age of COVID-19

    Jim Richberg, Public-Sector Field CISO of Fortinet, discusses how agencies should begin preparing now for the next crisis and for looming budget constraints.


    • CMMC, Cybersecurity , Fortinet
  • Making the Most of Industry Innovations

    Kyle Rice, CTO at SAP National Security Services, describes how the latest commercial capabilities can help agencies modernize and secure their operations.


    • SAP NS2, Cybersecurity
  • GovTech Report: Best of What's New in Cybersecurity

    Cyber threats are growing in scale and sophistication, as evidenced by recent ransomware attacks. Learn how state and local governments are responding with new tools and strategies to manage risk and strengthen their defenses.


    • All, Cybersecurity
  • BeyondTrust Improves Security for Higher Education

    Innovation in Government Success Stories: Hear how BeyondTrust partnered with a major university to implement a just-in-time privileged access management solution to address the challenges of managing identity lifecycles across diverse user populations.


    • CMMC, Cybersecurity , BeyondTrust
  • Agencies Need Force Multiplying Technologies to Manage Cyber Threats

    Dennis Reilly, the Vice President of Federal at Gigamon, explains how tools like next generation network packet brokers help agencies catch up and get ahead of cyber attackers.


    • Gigamon, Cybersecurity
  • FCW Report: The Next Wave of Cybersecurity

    Learn how agencies are finding innovative ways to navigate through a changing landscape of cyberthreats and risk. Featuring insights from Carahsoft's cybersecurity technology partners and industry research from FCW.


    • Cybersecurity , All
  • Using Data and Machine Learning to Address Vulnerabilities

    Adilson Jardim, Area Vice President for Public Sector Sales Engineering at Splunk, discusses analytics driven security and the importance of a defense-in-depth approach in today’s hyper-connected enterprise.


    • Splunk, Cybersecurity
  • Be Aware: Your Online Services May Be Suffering from Credential Stuffing Attacks

    Dan Woods, Vice President of the Shape Intelligence Center with Shape Security, now part of F5 Networks, discusses the rising success rate of credential stuffing attacks and how agencies can counter these tactics using advanced analytics on their network traffic.


    • Cybersecurity , F5
  • Navigating Uncharted Cyber Waters

    FCW's research team examines how agencies are looking for and finding innovative ways to plot a course through a seemingly limitless ocean of cyberthreats.


    • Cybersecurity , All
  • Identity Management: Meeting the Needs of Modern Computing Platforms

    Ted Girard, vice president of public sector for Okta, discusses how modern cloud-based identity systems can address the unique challenges of identity management in edge, cloud and IoT environments.


    • Multicloud, Cybersecurity , Okta
  • Cyber Leaders Share Insights on CDM

    Government leaders from the Department of Homeland Security, NASA and Department of the Interior join industry leaders from ForeScout Technologies, Gigamon and FireEye to discuss the past, present and future of the CDM program.


    • FireEye, Gigamon, Cybersecurity , Forescout