˹

  • Why Identity is the Key to Security

    New tools and strategies can help agencies protect systems while delivering a better user experience.


    • Cybersecurity , Akamai
  • Cyber Leaders on Identity Management

    Government leaders from the DoD, DoJ, FDIC and Agriculture Department join industry leaders from Radiant Logic, CyberArk, Okta and SailPoint to discuss the role of Identity Management in enabling more efficient access to resources and improving protection…


    • CMMC, Cybersecurity , CyberArk, Okta, Radiant Logic, SailPoint
  • The Key to Securing Cloud Resources

    As adversaries increasingly target IT administrators, David McNeely, Chief Strategy Officer of Centrify, explores how privileged access management rises to the challenge.


    • CMMC, Cybersecurity , Centrify
  • Rethinking Security in the Cloud

    Now that the network perimeter has dissolved, agencies must focus on protecting the user.


    • CMMC, Cybersecurity , Zscaler
  • Adopting a New Defensive Strategy

    The playing field is no longer clearly defined. Chris Usserman, Principal Security Architect at Infoblox, explains how agencies need to revise their playbook.


    • CMMC, Cybersecurity , Infoblox
  • Why AI Transforms Cybersecurity

    Tomer Weingarten, Co-Founder and CEO of SentinelOne, discusses how, with the help of AI, cybersecurity can scale up to meet the demands of a changing threat landscape. 


    • Cybersecurity , SentinelOne
  • Cybersecurity Starts with Visibility

    Learn why a pervasive view into far-flung networks is essential, and next-generation packet brokers can help achieve this visibility from Dennis Reilly, Vice President of Federal at Gigamon.


    • CMMC, Cybersecurity , Gigamon
  • Deb Snyder: Six Ways to Enhance Cybersecurity in a Post-Pandemic World

    Deborah Snyder, former CISO for the New York State Office of Information Technology Services, shares her thoughts on key steps state and local government agencies can take to improve cybersecurity in a post-pandemic environment.


    • Cybersecurity , All
  • The Importance of Privileged Access Security

    Agencies need targeted solutions to prevent hackers from compromising high-level credentials.


    • Cybersecurity , CyberArk
  • Assessing and Managing Cyber Risk

    As organizations evolve and their reliance on technology increases, securing the enterprise becomes more complex. Robert J. Carey, Vice President and General Manager of Global Public Sector Solutions at RSA, explains how a business-driven approach helps…


    • RSA, Cybersecurity
  • A Unified Approach to Visibility and Security

    Bill Rucker, President of Trustwave, explores how the growing complexity of IT environments and threats demands a single view into all resources.


    • CMMC, Cybersecurity , Trustwave
  • Attackers Target Government

    GovTech's research team details the trends behind how the public sector is adapting to the increasing scale and impact of cyber attacks with new tools and growing cybersecurity sophistication.


    • CMMC, Cybersecurity , All
  • Executive Viewpoint: A Conversation with Suzette Kent

    Federal CIO Suzette Kent discusses how the government's new data strategy informs cybersecurity, emerging technology and citizen services.


    • All, Cybersecurity
  • The Case for Open, Data-Driven Cybersecurity

    Agencies are turning to data-rich ⁠— and often open source-based tools ⁠— for security insights.


    • All, Cybersecurity , Corelight
  • GovLoop Guide: Your Guide to Mission-Driven Security

    This guide, created by Carahsoft and GovLoop, explores how how FedRAMP, CDM and TIC are evolving and how they will shape future federal cybersecurity efforts. Featuring insights from leaders at CISA, DHS and GSA and Carahsoft's technology partners.


    • Multicloud, CMMC, Cybersecurity , All