In-Depth Analysis of the Top Cyber Threat Trends Over the Past Year, the 2020 Global Threat Report is one of the industry’s most highly anticipated reports on today’s most significant cyber threats and adversaries.
Join DLT and Dynatrace in discussing the progression and potential future of mature technologies within the Public Sector space. Dynatrace takes a deep technical dive into their solutions and offers their expertise as a leader in the Application Performance Monitoring space (10 straight years in Gartner’s magic quadrant).
The purpose of this paper is to explain: The history of cloud security in the federal government, FedRAMP application to AWS, AWS use cases for managing FedRAMP, and ATO on AWS.
Cloudera SDX provides enterprise-grade security and governance on all data and metadata, with dedicated, integrated interfaces to manage it.
With Medallia's latest playbook, you'll learn the 5 essential management practices to help your school reopen successfully.
Hosted by Tom Temin, this episode breaks down Kubernetes and its impact on the public sector with Chris Gaun, CNCF ambassador and manager of the product team for Kubernetes platforms at D2iQ.
A webinar to present the findings of the above mentioned study. There will be a Q&A with Steve Grewal and Colonel Charles L. Destefani, Chief Data Officer, Air Force focused on federal challenges, best practices and mass data fragmentation.
A visual representation of the data pulled from MeriTalk research and Cohesity's MDF study with a focus on the federal government's journey to IT modernization, the lack of progress despite large budgets and next steps for success.
In partnership with reseller partner, CTG Federal, we created this piece based on an interview with Steve Grewal, focusing on data management at the tactical edge, the DoDs data consolidation challenges and opportunities for technology and process improvements.
Learn how Cloudera can help you choose the right stream processing engine for organization's needs by analyzing key technical and operational differentiators between four modern stream processing engines from the Apache open source community.
CIS released the CIS Amazon Web Services (AWS) Foundations Benchmark, intended for system and application administrators, security specialists, auditors, help desk, platform deployment, and/or DevOps personnel who plan to develop, deploy, assess, or secure solutions in Amazon Web Services.
The line between IT and Security is blurring. What was once a simple delineation between keeping information safe and providing the tools necessary to get work done is no longer clear. In this short paper, we’ll look at why asset management – once a pure IT play – matters for cybersecurity, and how both IT and security teams can benefit from cybersecurity asset management.
After working with hundreds of security professionals and covering over 1 million assets at some of the world’s most innovative brands, the team at Axonius has identified 5 things that security teams discover when they automate cybersecurity asset management. In this short paper, we’ll review each of these findings, discuss their security implications, and show how automating asset management can both find and resolve these challenges.
Eight years after former Forrester analyst John Kindervag introduced the Zero Trust model, the concept has hit the mainstream. As current Forrester analyst Chase Cunningham says, 85% of his calls involve zero trust. With the amount of interest in the concept, many organizations are rushing to understand how to implement the zero-trust model. In this guide, we’ll look at the first step to implementing zero trust: asset management.