• Resource: Prevent Encrypted Threats and Data Loss with Inline SSL Decryption

    Read this whitepaper to learn about the benefits and challenges of some of the most common approaches available to inspect encrypted traffic and about a new technology from Gigamon that delivers an advanced inline SSL/TLS decryption solution that fosters greater network visibility.


    • Gigamon, Cybersecurity
  • ServiceNow Full Length Radio Show

    Bob Osborn, Chief Technology Officer of Federal for ServiceNow, discusses how agencies can take advantage of cloud in a secure way and reduce the time it takes to deliver mission critical services by accepting and using a hybrid, multi-cloud approach.


    • ServiceNow, Cybersecurity
  • Splunk Full Length Radio Show

    Gary DePreta, the Area Vice-President for Defense, Intelligence and Aerospace at Splunk, discusses how challenges can be reduced if agencies and organizations better understand the data around their cyber threats and vulnerabilities.


    • Splunk, Cybersecurity
  • Speed up Decision-Making Capabilities with Splunk

    Gary DePreta, the Area Vice-President for Defense, Intelligence, and Aerospace at Splunk, explains why agencies need to speed up their decision-making capability when protecting their networks and systems.


    • Splunk, Cybersecurity
  • A Holistic Perspective of Cybersecurity Data

    Gary DePreta, the Area Vice-President for Defense, Intelligence, and Aerospace at Splunk, discusses why cybersecurity data needs to be understood from a more holistic perspective.


    • Splunk, Cybersecurity
  • Weathering the Cyber Storm

    Read about the evolving efforts agencies are taking to combat cybersecurity challenges and protect their systems.


    • All, Cybersecurity
  • Evolving Your Security Posture

    Read how automation and orchestration are integral to maturing your cyber security program as written about by Chris Usserman.


    • Cybersecurity , Infoblox
  • Breaking the Cycle of Cyber Breaches

    Read about how finding the right mix of security tools requires flexibility and a focus on the outcomes, written by Akamai's Senior Director of Global Security Strategy, Patrick Sullivan.


    • Cybersecurity , Akamai
  • Cyber is a Data Problem

    Learn how agencies can outsmart cyber threats with the help of machine intelligence as written by Barry Leffew, Senior Vice President and General Manager of National Security Services.


    • SAP NS2, Cybersecurity
  • Zero Trust and the Quest for Cloud Security

    Hear about why the government needs to combine the power of FedRAMP and TIC to build trusted environments in the cloud from Stephen R. Kovac, Vice President of Global Government and Compliance at Zscaler.


    • Cybersecurity , Zscaler
  • Executive Viewpoint with Dominic Cussatt

    Read about how Veterans Affairs is creating a resilient cyber security ecosystem from chief information security officer Dominic Cussatt.


    • All, Cybersecurity
  • Resource: Who is SAP NS2?

    This YouTube video explains who NS2 is and how it functions as a wholly owned subsidiary of SAP America, Inc.


    • SAP NS2, Cybersecurity
  • GCN Report: The Next Wave of Cybersecurity

    Learn how government agencies are navigating through the increasingly treacherous sea of cyberthreats using emerging tools and tactics.


    • All, Cybersecurity
  • Resource: Mission Possible: Protecting Federal Users Anytime, Anywhere

    This whitepaper discusses how enabling TIC-in-the-Cloud provides secure, policy-based access to applications and SaaS services for federal agencies.


    • Cybersecurity , Zscaler
  • Red Hat Full Length Radio Show

    Rob Efrus, President of the Coalition for Enterprise Open Source Software for Government, and Paul Smith, General Manager and Senior Vice President of the North America Public Sector for Red Hat, discuss a DevOps approach to government, a crowdsourcing approach to security, and much more.


    • Red Hat, Open Source