Free online learning for government employees.
How to Build a Better Endpoint Security Strategy
Agency IT environments have become increasingly complex in recent years, with employees accessing data and applications using multiple endpoint devices, creating more vulnerabilities for malicious actors to exploit. In this video interview, Jared Vichengrad, Head of Public Sector at Check Point Software Technologies, discusses how agencies can take a more comprehensive approach to endpoint security.
Related Videos
Nov-24-2025
After making significant investments in artificial intelligence and developing numerous use cases and proof of concepts, many a...
Turn AI Investments Into Meaningful Outcomes
Nov-24-2025
It’s one thing to develop use cases for artificial intelligence, and to launch proof-of-concepts and pilot programs to test tho...
Combine the Power of Search and Cloud to Deliver on AI
Nov-18-2025
Agencies depend on software applications to deliver reliable, effective digital services to constituents, but old-school testin...
Getting Serious About Software Testing: The Model-Based Approach
Nov-18-2025
Old-school approaches to software testing are ill-suited for today’s fast-moving and complex environments and can undermine the...
The Software Testing Advantage: Model-Based Automation
Nov-07-2025
Artificial intelligence places new demands on data management, as it pulls from multiple data sources and configurations and ma...
Scaling Up Data Governance for AI
Nov-07-2025
Artificial intelligence makes analytics more accessible to non-technical users, but places new demands on data governance. Agen...
The Right Platform to Increase Data Access
Oct-30-2025
The cyberthreat landscape has changed. Adversaries are now organized, industrialized and backed by nation-states. Agencies oper...
Combatting the New Cyberthreats With Automation and AI
Oct-30-2025
Artificial intelligence is the double-edged sword of cybersecurity, both raising the risks and providing new and more effective...
Fighting Fire With Fire: Cybersecurity in the Age of AI
Oct-23-2025
Agencies often contend with legacy tech and data silos that develop over time, jeopardizing government readiness and creating s...
How to Fix the Fragmentation That Hinders Government Readiness
Oct-23-2025
Legacy technology and data silos often develop organically over time — as IT teams address individual challenges — but they und...
Overcoming the Fragmentation That Hampers Government Readiness
May-02-2025
Risk management, a concept that originated in the financial sector, has not proven to be a good fit for cybersecurity, accordin...
Cyber Risk Management? A Better Bet Is Danger Management
Apr-29-2025
Artificial intelligence (AI) can detect cyber threats and take action faster and more accurately than any human. But making the...
Building a Network for AI Cybersecurity
Mar-25-2025
The proliferation of user devices has become a nightmare for cyber professionals, as they find themselves managing multiple end...
How to Bolster Your Endpoint Defenses
Mar-17-2025
Agencies relying on outdated infrastructure are both missing out on recent advances in networking and security capabilities and...
Why Network Modernization Tops the IT Agenda
Jul-21-2020
The golden rule of security is to always be prepared. And when it comes to protecting critical cloud-based data, old tactics ju...