Case Study

The State of Wyoming Department of Enterprise Technology Services (ETS) needed to replace a legacy antivirus solution that was missing detections, impeding the ability of end users to do their jobs, and not providing crucial 24/7 protection. CrowdStrike® Falcon® was the answer.

Added:
Solution Brief

Election board members and state IT leaders need to protect the integrity of the voting process by stopping cyberattacks from interfering with election systems

Added:
Podcast

This week, we sat down with Steve Grewal, the federal CTO at Cohesity to discuss data fragmentation and security in the public sector.

Added:
eBook

​This eBook explains the common challenges and value drivers that are used to model unstructured data to help executives who are trying to make a decision about investing in an enterprise-wide AI platform.

Added:
Podcast

In our most recent episode, BMC Software’s Jon Powers discusses security operations — or SecOps — for the public sector.

Added:
Report

This report provides a summary of the OverWatch team’s threat hunting findings from the first half of 2020. It reviews intrusion trends during that time frame, provides insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified.

Added:
Podcast

​Please enjoy this wide-ranging conversation with our special guest Dr. Ron Ross as we discuss the future of DevSecOps in the Public Sector and so much more.

Added:
Whitepaper
Added:
Webinar

NetBrain automation can reduce the time and manpower requirements by upwards of 90%, resulting in huge cost savings both in the initial audit preparation time and in post-audit activities. Watch the webinar to learn how NetBrain automation can help address CMMC requirements.

Added:
Webinar

DLT and Coalfire have partnered to help examine the intricate certification levels and controls to the Department of Defense's CMMC compliance, with additional details of the impact in management of workloads in the cloud.

Added:
Webinar

Federal contractors and subcontractors are being breached at alarming rates, resulting in the loss of sensitive data. To address this challenge, agencies like the Department of Defense are turning to new cybersecurity requirements for contractors, including the Cybersecurity Maturity Model Certification (CMMC).

Added:
Webinar

​Federal contractors and subcontractors are being breached at alarming rates, resulting in the loss of sensitive data. To address this challenge, agencies like the Department of Defense are turning to new cybersecurity requirements for contractors, including the Cybersecurity Maturity Model Certification (CMMC).

Added:
Case Study

Given the confidentiality and sensitivity of information, adherence to the client’s data security policies is essential. The platform has specific functionalities, such as row level security, data masking and column pruning, to ensure compliance without hampering performance.

Added:
Case Study

Intenda’s FraXses data fabric solution provides unparalleled features for aggregating and blending data from various sources while also implementing a delivery system for app developers to consume this data.

 

Added: