Archived Events
View this On-Demand recording to learn how to secure applications in Kubernetes environments. Tech experts from Thales TCT and D2iQ discuss how to establish a zero trust environment that safeguards data in Kubernetes deployments.
High-speed networks are the critical foundation that supports many of an agency's most vital communications and operations. However, this foundation is at risk of surveillance and attack by increasingly sophisticated cyber criminals and well-funded nation-states. These network connections, if unprotected, are proving to be ...
Key management is a no-brainer - the encryption keys used to encrypt/decrypt data must be protected to prevent unauthorized access to the encrypted data. Many data-at-rest encryption providers offer low-cost, native key management tools that afford some level of protection for encryption ...
View this on-demand recording to learn how federal agencies can ensure that their data is properly protected through data and content sanitization deployed in Microsoft 365 environments.Thales TCT's and Votiro's security experts will overview how content disarm and reconstruction technology ...
High-performance computing (HPC) has long expanded from research labs to commercial use. Computational modeling and simulation along with high-performance data analytics using HPC systems are prevalent in industries from the design and ...
Most people in government would confirm that cybersecurity is their #1 priority right now. A hybrid work environment with its enlarged attack surface and a continuing escalation in the number and sophistication of attacks put the systems and the data that resides on them at an uncomfortable level of risk.The ...
In December, DISA announced that it planned to cease the use of milCloud 2.0 cloud services on May 20, 2022. This means that all milCloud 2.0 users will have to ...
Petabytes—and even exabytes—of data are scattered across data centers, file shares, databases, cloud storage, and backups. Most agencies simply do not know what sensitive data they have, where it is, how it flows, who can access it, and its risk exposure. In agencies ...
During this webinar, attendees learned how Thales Trusted Cyber Technologies' Luna Credential System introduces a new approach to multi-factor authentication by maintaining user credentials in a centralized hardware device that is securely accessible by ...
Federal agencies require a simple way to correlate all security-relevant data so they can manage their security posture. Instead of merely watching events after they occur, agencies should anticipate their occurrence and implement measures to limit vulnerabilities in real ...