Upcoming Events
During our Live Tech Demo, attendees explored how Ivanti Neurons for RBVM can:
Prioritize vulnerabilities based on real-world exploit risk, asset criticality, and threat intelligence.
Reduce remediation time by focusing on the vulnerabilities most likely to be ...
Join Conceal and Carahsoft to explore how ConcealSearch empowers professionals to safely perform research from anywhere in the world without the risk of attribution or exposure.
Our featured speakers will ...
This webinar will explore Axonius Federal Systems and their achievement in becoming FedRAMP authorized. Also, discussing how Axonius is enabling federal agencies to deploy the Axonius Asset Cloud and its ...
For Virtual and Datacenter Administrators
Cybersecurity threats are continuing to increase and getting more advanced. The evolving nature of technology constantly challenges organizations to adapt their cybersecurity measures to defend against these persistent threats.
Nutanix Flow is a ...
Archived Events
In today's dynamic threat landscape, organizations, especially within the State, Local and Education sectors, face the challenge of enhancing their cybersecurity posture without overhauling existing systems.
Gartner's Continuous Threat Exposure Management (CTEM) framework offers a strategic approach to ...
As our CTEM series concludes, this final session brings together the critical elements needed to operationalize a proactive exposure management program. Agencies and organizations managing cyber-physical ...
Carahsoft and our partners will be exhibiting at CANSEC, May 28 - 29, 2025, at the
Join Bastille and Carahsoft for this exclusive webinar to discuss the nearest neighbor attack.
Cyber threats are evolving—attackers no longer need to be physically close to breach your wireless network. The Nearest ...
Today’s SLED environments are more distributed than ever with libraries, schools, remote offices and field teams all relying on secure Wi-Fi and cloud-connected infrastructure. But these access points are now prime targets for threat actors who bypass traditional perimeter defenses.
In ...
Cyber threats are evolving, and privileged access remains a top target for attackers. 80% of Windows breaches succeed due to excessive privileges, making it crucial for organizations to rethink their security strategies.
Join Dave Gunther, Regional Sales Manager at CyberFOX, as he explores how ...