Archived Events
Thank you for attending our Zero Trust - Beyond the Buzzword webinar! During this webinar, you learned:
What is Zero Trust and how it applies to data security
How digital transformation can make data vulnerable but also more secure.
Tips for putting Zero Trust ...
During this webinar, attendees learned about:
Comprehensive Data Protection
On the first installment of Thales TCT’s CTO Sessions Webcast Series for 2023, Thales TCT’s CTO Office will share predictions on the top 5 tech trends for the year and what these trends mean for federal agencies:Quantum-Resistant SecurityCloud SecurityZero TrustData ...
Core computing functionality, commonly found in data centers and in the cloud, is also being deployed at the edge — data protection capabilities must transition with that move.However, many challenges often stand in the way of extending core-level security to the edge. Harsh environments, disconnected ...
View this On-Demand recording to learn how to secure applications in Kubernetes environments. Tech experts from Thales TCT and D2iQ discuss how to establish a zero trust environment that safeguards data in Kubernetes deployments.
High-speed networks are the critical foundation that supports many of an agency's most vital communications and operations. However, this foundation is at risk of surveillance and attack by increasingly sophisticated cyber criminals and well-funded nation-states. These network connections, if unprotected, are proving to be ...
Key management is a no-brainer - the encryption keys used to encrypt/decrypt data must be protected to prevent unauthorized access to the encrypted data. Many data-at-rest encryption providers offer low-cost, native key management tools that afford some level of protection for encryption ...
View this on-demand recording to learn how federal agencies can ensure that their data is properly protected through data and content sanitization deployed in Microsoft 365 environments.Thales TCT's and Votiro's security experts will overview how content disarm and reconstruction technology ...
High-performance computing (HPC) has long expanded from research labs to commercial use. Computational modeling and simulation along with high-performance data analytics using HPC systems are prevalent in industries from the design and ...
Most people in government would confirm that cybersecurity is their #1 priority right now. A hybrid work environment with its enlarged attack surface and a continuing escalation in the number and sophistication of attacks put the systems and the data that resides on them at an uncomfortable level of risk.The ...