Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

f5-logo-rgb_transparent.png
Multi-Vendor

Tech on Tap: F5 Future Proofing Your Applications and APIs


Event Date: June 22, 2023
Hosted By: F5, Red Hat & Carahsoft
Location: Laurel, MD

APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vulnerable to a data breach, fraud, or worse.

In the last couple of years, there have been several well-publicized API attacks. No industry or branch of government seems to be safe. With recent reports indicating that API attack surface vulnerabilities are costing businesses billions of dollars annually, it’s no wonder they are at the top of mind when it comes to a CISO and is a key factor in modern Zero Trust architectures.

Attendees joined F5, Red Hat, and Carahsoft in this interactive Tech on Tap to learn the basics of APIs, their vulnerabilities, and how to keep them secure. They demonstrated a live demo with some live hacks on real websites.

During this Tech on Tap, attendees learned:

  • A deeper understanding of the key concepts and tools necessary for securing API in modern authentication and security techniques
  • Automated Policy Generation - based on App-to-App and API-to-API patterns
  • How to gain confidence to implement secure APIs in your projects and environments
  • How to visualize API Usage
  • API Endpoint Identification, Mapping, and Protection for your Distributed Cloud Architectures
  • How APIs can power event-driven automation for security, compliance, ITSM, remediation and other use cases
  • How AI can accelerate your automation journey

Fill out the form below to view this archived event.


Resources


Building Cyber Resilience in a World of Destructive Cyberattacks
Whitepaper

Building Cyber Resilience in a World of Destructive Cyberattacks

Cohesity addresses the challenges of cybersecurity and destructive cyberattacks by offering an integrated platform that bridges security and IT recovery operations. This solution emphasizes the creation of isolated "clean rooms" for secure investigation, preventing attackers from observing response actions. They also provide a "staging room" for controlled system recovery, allowing teams to restore functions while addressing vulnerabilities and mitigating risks of reinfection. By centralizing response and recovery efforts on a single platform, Cohesity enhances organizational resilience, minimizing downtime and strengthening defenses against future attacks.


Fill out the form below to view this Resource.