Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

NucleusSecurity-microsite.png
Nucleus Security

5 Steps Federal Agencies Should Take to Get Vulnerability Management Under Control


Event Date: October 13, 2022
Hosted By: Nucleus Security & Carahsoft

Vulnerability management has become an increasingly complicated security challenge for Federal agencies to tackle with the increase in vulnerabilities and acceleration of cloud adoption. Agencies are driven to follow Federal guidelines such as CISA BOD 22-01 and guidance included in the recent Cyber Safety Review Board report on Log4j.

Join Nucleus Security’s Co-Founders, CEO Steve Carter and CTO Scott Kuffer, as they go through the five practical steps Federal agencies can take to get vulnerability management under control.

In this webinar, our experts will discuss:

  • Challenges Federal agencies face with vulnerability management
  • Practical solutions on how to get vulnerability management under control
  • How to prioritize vulnerability remediation using threat intelligence
  • How vulnerability management can be orchestrated and automated
  • How Nucleus addresses unique federal vulnerability management mandates

If you have any additional questions, please feel free to contact us
Don't wait, register now

Fill out the form below to view this archived event.


Resources


Tech Spotlight - Serverless vs. Containers: Why Not Both?
Presentation

Getting Started with Containers, Kubernetes and Red Hat OpenShift

Evolving technical demands and resource constraints are spurring school systems to embrace innovative technologies that enable IT modernization efforts, at scale. Red Hat Training expert, John Walter, shared this presentation during his high-level course introducing Linux containers and container orchestration technology using Docker, Kubernetes and Red Hat OpenShift Container Platform.

During the technical workshop, attendees:

  • Explored the concepts of containerization — and see them in action
  • Learned about containerizing applications and services, testing them using Docker and deploying them on a Kubernetes cluster using Red Hat OpenShift
  • Watched a demonstration of how to build and deploy an application from source code using the source-to-image facility of OpenShift

Download PDF