Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
When it comes to the process of FedRAMP authorization, there is a great deal of misunderstanding. This webcast explores the many misconceptions surrounding FedRAMP authorization, giving you insight into the reality of the situation so that you can better understand the process. Tune in to learn more.
In discussion with Endace’s Michael Morris, Cisco Systems’ Senior National Security and Government Strategist provides his thoughts on cybersecurity standards and the risks in today’s landscape. The two consider how government agencies could promote bolstered security resiliency. Watch now to unlock their conversation in full.
Recently, you may have noticed that the White House is rolling out a new cybersecurity strategy that assigns responsibility to tech firms as well as expanding the government’s role in digital infrastructure. So, what does this mean for businesses that build apps with open source? It means they will be affected. Watch this video to learn more.
The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.