The past 24 months have proven to be some of the most challenging for information security analysts, leaders and stakeholders. We are battling workforce complications associated with the COVID-19 pandemic and seemingly never-ending cyberattacks. Coupled with an increase in supply chain issues, defending your organization can seem tougher daily. However, adversaries are not the only ones who have made advancements in technology capabilities. Join us for the Carahsoft Government Security Solutions Forum, where we will explore concepts and technologies to help defend against adversaries of all shapes and sizes. With a wide range of experts and topics, this forum will provide opportunities for assessing your current security posture and looking for future improvements.
States, localities and educational institutions are increasingly targeted by ransomware. Is your SOC ready? Join your peers and our industry experts for a virtual session showcasing a day in the life of the Palo Alto Networks SOC team, and see how they’re protecting the world’s largest cybersecurity company every day. We’ll share a unique view of how we built and operate the Palo Alto Networks SOC, including a deep dive into our security stack and processes. You’ll come away with insights and best practices that you can use to design and implement a SOC in your organization. Following the tour, Palo Alto Networks Sr. Staff Security Engineer (SOC Ops specialist) Devin Johnstone will guide the group in a discussion of the unique needs of public sector security operations professionals, which includes managing countless tools and keeping systems compliant and up to date to avoid risk exposure. This session features: - Background on Palo Alto Networks internal scope and exactly what we’re protecting. - A deep dive into how Palo Alto Networks designed our SOC to be resilient in the face of changing workforce models and new technologies. - An open discussion with other public sector security operations professionals like yourself around the unique needs of the public sector.
Adopting a Zero Trust architecture is certainly not a new concept, but its implementation has never felt as urgent as it does now. With sophisticated and tireless cyberthreats, a permanently expanded perimeter defining the next normal and increased support from the current administration to prioritize Zero Trust advancement, federal agencies are taking unprecedented measures to modernize their security efforts and defend against tomorrow’s attacks. Join Nextgov and Route Fifty in this episode to explore the efforts made since the Biden administration’s Executive Order on Improving the Nation's Cybersecurity and the path forward for Zero Trust.
The increasing pressure by hostile nation-states and other bad actors who are relentlessly probing the networks of federal, state and local governments underlines the importance of effective attack surface management.
MeriTalk's Defining Moments explores events that are having profound effects on government and IT. Palo Alto Networks Senior Vice President of Public Sector Dana Barnes kicks off the new series with an examination of how the global pandemic inspired a new working world.
Reliance on legacy networking architectures has seen DOD leaders across the globe contending with scalability, performance and usability constraints across their cloud access points.
Learn how 5G-Native Security protects all facets of the 5G infrastructure, including the user communications, applications, and data of business-critical enterprises, governments, as well as consumers.
The SolarWinds hack, increasing pressure on U.S. networks by foreign incursions and software vulnerabilities underline the importance of effective internet operations management.
High-profile software supply chain attacks, such as SolarWinds and Kaseya VSA, have shed a glaring light on the disparity between agencies’ perceptions of security within their cloud infrastructure and the reality of supply chain threats that can impact business catastrophically.
The advent of containerized software services – and the emergence of Kubernetes to deploy and manage them – have played crucial roles in modernizing applications.
If you had to choose between a standard utility knife and a Swiss Army knife, which one would you pick? Most people would choose the latter because it can do more.
Unit 42 brings together world-renowned threat researchers with an elite team of security consultants to create an intelligence-driven, response-ready organization.
Palo Alto Networks offers a fully secure, end-to-end, Zero Trust–enabled cloud security architecture to meet the goals of the federal government’s application modernization and cloud migration requirements.
Since the pandemic began more than a year and a half ago, government agencies and their workforces, just like their private sector business counterparts
In this replay, Palo Alto Networks Senior Director of Systems Engineering discusses how many agencies are further along the journey to Zero Trust than they think.
Since the pandemic began more than a year and a half ago, government agencies and their workforces, just like their private sector business counterparts
Agencies and corporations alike are facing an increase in supply chain attacks. Recently, these cyberattacks have succeeded in exfiltrating an alarming amount of data with extortion fees well beyond typical ransom prices