Defense Communications Agency Multimedia

(View All Report Types)
How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009


Agencies Look Toward New Emergency Networks when Disaster Strikes
sponsored by T-Mobile for Business
WEBCAST: 5G wireless networks are expected to provide a leap in performance above legacy 4G communications, but first responders can still face the prospect of congested and unavailable communications networks during a natural disaster or emergency. Watch this video to learn how first responder can combat network trafficking challenges.
Posted: 03 Aug 2022 | Premiered: Aug 3, 2022

T-Mobile for Business

SAIC Shares Military-Grade Kubernetes Best Practices for Digital Transformation
sponsored by D2IQ, Inc.
WEBCAST: With Kubernetes becoming more prevalent in military and government agencies, SAIC needed a better way to deploy Kubernetes for their clients in the defense and intelligence communities. This webinar details how D2iQ helped SAIC simplify its Kubernetes and advanced cloud-native deployments. Tune into the conversation here.
Posted: 28 Jul 2022 | Premiered: Jul 28, 2022

D2IQ, Inc.

The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009


How Proofpoint Defends Against Cloud Account Takeover
sponsored by Proofpoint
WEBCAST: Cloud account takeover is a severe security threat that pervades businesses today. In this attack, cybercriminals simply use compromised user credentials to enter infrastructure and steal sensitive data. This resource provides an overview of ProofPoint solutions that can help your organization prevent falling victim to Cloud account takeovers.
Posted: 12 Aug 2022 | Premiered: Aug 12, 2022


Custom Express Do and Don't
sponsored by TechTarget
WEBCAST: Custom Express Do and Don't
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

TOPICS:  White Papers

Four Key Elements to Improving Systems Engineering in Aerospace and Defense
sponsored by IBM
WEBCAST: This webcast explores four key ways in which A&D companies can improve SE and looks at IBM Rational® solutions and approaches that can help organizations deliver quality products on time and within budget, while increasing efficiency and improving collaboration.
Posted: 13 Dec 2010 | Premiered: Dec 13, 2010