Free online learning for government employees.
How to Spot and Handle a Phishing Attempt
It's not easy to hear, but every employee -- yes, every one of us -- is a potential weak link in our organization's cyber defenses. This video, developed in collaboration with Red Hat, explains how to avoid falling victim to one of the most dangerous and insidious threats: e-mail phishing attempts. Because what you don't know can hurt you....and your agency.
Related Videos
Jul-16-2024
Mobile technology has changed how government employees work, and hackers have noticed. Mobile-specific threats are on the rise,...
The Hidden Dangers: A Guide to Mobile Security Threats
Jul-03-2024
Hybrid work has put state and local government agencies in a fix: They need to strengthen security for hybrid workers but not a...
Secure the Hybrid Workplace Without Compromising Performance
Mar-04-2024
As agencies embark on their journey to zero trust, they'll find no lack of tools to help them on their way. The problem is that...
Deploying Zero Trust Network Access to Drive Improved Cybersecurity
Jul-31-2023
Despite new technologies and new policies, cyber criminals continue to find ways to infiltrate government networks.
That’s why...
Next-Level Network Security: How to Detect Hidden Threats
Oct-26-2022
Yes, a zero trust-based approach to cybersecurity is complicated. And yes, you need to understand what it is and why it's impor...
Why Zero Trust? Why Now?
Aug-05-2022
Trying to figure out what exactly is in your cloud environment can be a bit like trying to get through a maze while blindfolded...
Best Practices for Hardening Cloud Security
Mar-31-2022
There's no getting around it: Malicious cyber actors see state and local agencies as prime targets -- both because they manage ...
All Aboard! 6 Stops on the Journey to Better Security
Jan-21-2022
No one likes to think about it, but every time an employee uses a mobile device to access an agency's network, they might be op...
5 Steps for Stopping Mobile Threats Before Damage Is Done
Dec-28-2021
Today's network operations no longer follow the old rules where everything that was enclosed within the network boundaries was ...
Embracing the Zero Trust Framework
Nov-24-2021
A mobile device can be a convenient and necessary communications tool as well as a missile heading for your critical data. Find...
Enabling Zero Trust for Your Mobile Devices
Nov-28-2023
A Rube Goldberg machine is a ridiculously complicated, enormously complex gizmo used to accomplish a simple task. The concept i...
How to Take the Pain and Complexity out of IT Management
Feb-11-2022
If you're nervous about moving mission-critical apps to the public cloud, you're not alone. And if your on-premises operations ...
How One Agency Transformed Vital Operations Without Losing Its Mind
Feb-02-2022
The idea of a hybrid cloud environment, integrating cloud and on-premises systems, looks great on paper but often seems dauntin...
Removing Roadblocks to a Hybrid Cloud Deployment
Sep-28-2021
This course was created in partnership with Red Hat. It was inspired by GovLoop’s guide “Delivering Government Services Through...
GovLoop Examines: How to Drive Problem-Solving that Puts People First
Jun-21-2021
In the modern battlefield, facing near peer adversaries, the U.S. military forces must coordinate to leverage every advantage a...
Making Better Tactical Decisions by Integrating Military Data
Dec-14-2020
What may sound like A Space Odyssey's HAL is becoming a reality for citizen and professional data scientists – real-time data a...
Real-Time Data Analysis in the Field
Dec-09-2020
Containerization is rapidly changing how agencies develop software, providing a way to build applications that can move easily ...
Containerization: Don’t Get Blindsided by Hidden Security Threats
Nov-18-2020
When you have access to all your data, then your agency can make the best use of it. Yet, many agencies rely on disconnected to...
How to Get the Most Value From All Data, All the Time
Nov-12-2020
Over the past decade, the Defense Department (DoD) has widely adopted the Linux open source operating system. Linux offers stab...
Getting the Most Value From Linux
Aug-18-2020
According to Gartner, 75% of organizations are taking a hybrid approach to cloud. The problem is that a hybrid cloud environmen...
Creating Your Open Hybrid Cloud Strategy
Aug-11-2020
Explore how one California county saved lives with its website's performance and accessibility during the California wildfires....
Accelerating Digital Transformation With Observability of Microservices
Jul-28-2020
Many agencies have adopted a DevOps approach to software development. But while they find DevOps works well on a limited basis,...
Mapping Out Digital Transformation With a DevOps Culture
Mar-13-2020
Today’s world and today’s government require new skills—skills involving creative differentiation and innovation. Employees tod...
Organizing for Open in Your Leadership and Culture
Mar-12-2020
According to a recent report, 48% of developers say that they don’t have enough time to spend on addressing security issues. An...