·¬ÇÑÊÓƵAPP

  • The Key to Securing Cloud Resources

    As adversaries increasingly target IT administrators, David McNeely, Chief Strategy Officer of Centrify, explores how privileged access management rises to the challenge.


    • CMMC, Cybersecurity , Centrify
  • Rethinking Security in the Cloud

    Now that the network perimeter has dissolved, agencies must focus on protecting the user.


    • CMMC, Cybersecurity , Zscaler
  • Adopting a New Defensive Strategy

    The playing field is no longer clearly defined. Chris Usserman, Principal Security Architect at Infoblox, explains how agencies need to revise their playbook.


    • CMMC, Cybersecurity , Infoblox
  • Why AI Transforms Cybersecurity

    Tomer Weingarten, Co-Founder and CEO of SentinelOne, discusses how, with the help of AI, cybersecurity can scale up to meet the demands of a changing threat landscape. 


    • Cybersecurity , SentinelOne
  • Cybersecurity Starts with Visibility

    Learn why a pervasive view into far-flung networks is essential, and next-generation packet brokers can help achieve this visibility from Dennis Reilly, Vice President of Federal at Gigamon.


    • CMMC, Cybersecurity , Gigamon
  • Maintaining Productivity in Times of Crisis

    Jonathan Alboum, Principal Digital Strategist for Federal at ServiceNow, explains why better asset management and digitized workflows are essential to a seamless customer experience.


    • Customer Experience & Engagement, ServiceNow
  • New Opportunities to Modernize Security

    Jon Ramsey, Secureworks CTO, explains how IT modernization is opening up innovative ways to tackle cyberthreats.


    • Emerging Technologies, Secureworks
  • Deb Snyder: Six Ways to Enhance Cybersecurity in a Post-Pandemic World

    Deborah Snyder, former CISO for the New York State Office of Information Technology Services, shares her thoughts on key steps state and local government agencies can take to improve cybersecurity in a post-pandemic environment.


    • Cybersecurity , All
  • The Importance of Privileged Access Security

    Agencies need targeted solutions to prevent hackers from compromising high-level credentials.


    • Cybersecurity , CyberArk
  • Consolidated Toolchains Deliver Better and Safer Software

    John Jeremiah, Product Marketing Leader for GitLab, discusses how a consolidated toolchain management approach improves value and time to delivery.


    • Open Source
  • FCW Compendium: 2019 Year In Review

    To aid with 2020 planning, Carahsoft has compiled all 7 of its 2019 Innovation in Government reports from FCW into one comprehensive compendium. Learn the latest developments across multiple technology verticals, including Cloud Adoption, Cybersecurity,…


    • All, All
  • How Context Enriches CX

    Habib Hourani, Solutions Engineer at Okta, explains how deeper insights into customers and employees contribute to robust, frictionless authentication.


    • Customer Experience & Engagement, CMMC, Okta
  • Building a Future-Ready IT Infrastructure

    Michael Houlihan, Senior Director of the DoD Sales Team at VMware, discusses how modernization efforts are gaining momentum as the pandemic spurs progress in key areas.


    • CMMC, Emerging Technologies, VMware
  • Assessing and Managing Cyber Risk

    As organizations evolve and their reliance on technology increases, securing the enterprise becomes more complex. Robert J. Carey, Vice President and General Manager of Global Public Sector Solutions at RSA, explains how a business-driven approach helps…


    • RSA, Cybersecurity
  • The Path to Secure, Seamless CX

    Russell Brodsky, Director of Government Sales at Nuance, says that authentication and engagement technologies balance security with experience while reducing costs.


    • Customer Experience & Engagement