Intelligent API Cybersecurity, Is Your Agency Protected?

Carahsoft

As government agencies move towards digital transformation, Cyber threats are getting smarter, using social engineering, brute force methods, and even artificial intelligence (AI) to bypass common defenses to gain access to these critical systems and data. To help protect Federal Agencies against an ever-diversifying landscape of cybersecurity threats, Axway and Ping Identity have formed a global partnership to deliver a comprehensive Application program Interface (API) security solution that optimizes security at all levels, from network to application.
Watch Now

Spotlight

Whether public key infrastructure (PKI) is your passion or it’s something you wouldn’t touch with a 39-and-a-half-foot pole, it’s without a doubt become critical to the security of your organization. A rare few companies have an in-house expert or even an entire team dedicated to PKI, but for most, it’s more of a “hot potato” th

OTHER ON-DEMAND WEBINARS

Approaching Cyber Security Vendor Selection in OT Environments

Nozomi Networks

Operational Technology (OT) and ICS environments present unique challenges for the selection of security solutions. Join ARC Advisory Group Vice President of Research, Larry O’Brien as he shares his recommendations for cyber security vendor selection in the ICS and OT worlds.
Watch Now

Your Code Isn’t Static Your Processes Shouldn’t be Either

The only thing constant is change, and change requires oversight and very possibly an overhaul of your processes to support any shifts. The open source world is not exempt. Net, your code isn't static so your processes shouldn't be either. What open source management processes should be in your team's eyeline? How does change im
Watch Now

Managing Cyber Security Risks

Ever wonder how businesses get exposed to cyber-attacks like ransomware, phishing, social engineering scams, and more? Is your organization vulnerable to these threats? If you are uncertain about the vulnerabilities in your business that could lead to a major loss in productivity, revenue… or worse… attend this webinar and learn how to identify risk factors and bolster your organization’s defenses.
Watch Now

Palo Alto Networks & CyberX Integration: Accelerating the Time Between ICS/SCADA Threat Detection and Prevention

CyberX

This SANS webinar discusses how to secure ICS and SCADA environments using the Palo Alto Networks Security Operating Platform and CyberX’s purpose-built ICS cybersecurity platform. Daniel Shugrue, Senior Director of Industrial Cybersecurity at CyberX, and Dharminder Debisarun, Industry Security Architect at Palo Alto Networks, describe how the Industrial Internet of Things (IIoT) is helping organizations improve safety, increase output, and maximize revenue, while at the same time digitalization is driving deployment of billions of IIoT devices and increased connectivity between IT and Operational Technology (OT) networks, increasing the attack surface and risk of cyberattacks on industrial control systems.
Watch Now

Spotlight

Whether public key infrastructure (PKI) is your passion or it’s something you wouldn’t touch with a 39-and-a-half-foot pole, it’s without a doubt become critical to the security of your organization. A rare few companies have an in-house expert or even an entire team dedicated to PKI, but for most, it’s more of a “hot potato” th

resources