Free online learning for government employees.
  
 
  How to Bolster Your Endpoint Defenses
The proliferation of user devices has become a nightmare for cyber professionals, as they find themselves managing multiple endpoints, each with its own operating system, software versions and vulnerabilities. In this video interview, Jared Vichengrad, Head of Public Sector at Check Point Software Technologies, discusses how agencies can take a more comprehensive approach to endpoint security.
Related Videos
          Oct-30-2025
        
          
            The cyberthreat landscape has changed. Adversaries are now organized, industrialized and backed by nation-states. Agencies oper...
          
      Combatting the New Cyberthreats With Automation and AI
          Oct-30-2025
        
          
            Artificial intelligence is the double-edged sword of cybersecurity, both raising the risks and providing new and more effective...
          
      Fighting Fire With Fire: Cybersecurity in the Age of AI
          Oct-23-2025
        
          
            Agencies often contend with legacy tech and data silos that develop over time, jeopardizing government readiness and creating s...
          
      How to Fix the Fragmentation That Hinders Government Readiness
          Oct-23-2025
        
          
            Legacy technology and data silos often develop organically over time — as IT teams address individual challenges — but they und...
          
      Overcoming the Fragmentation That Hampers Government Readiness
          Oct-23-2025
        
          
            The central question about AI in government has shifted from “Will agencies adopt it?” to “How will they implement it?” As they...
          
      Transforming Workflows for — and With — AI
          Oct-23-2025
        
          
            Agencies are drowning in unstructured data — think about contracts, grants documents and policy manuals. AI-powered processes c...
          
      How AI Transforms Data Into Decisions
          Oct-17-2025
        
          
            You can’t defend against what you can’t see. This adage of cybersecurity is especially telling when it comes to zero-trust arch...
          
      How Observability Fills Key Gap in Zero-Trust Architecture
          Oct-17-2025
        
          
            The concept of zero-trust architecture has been around for a long time, yet many agencies still struggle to put it into practic...
          
      How Observability Strengthens Zero-Trust Architecture
          Oct-01-2025
        
          
            Agencies today need fast, reliable, secure access to their data, but their data infrastructure is fragmented and inflexible, ma...
          
      Data Modernization Is About More Than Infrastructure
          Oct-01-2025
        
          
            Too often, agency infrastructure cannot handle the explosion of data generated by a multitude of traditional and more non-tradi...
          
      A Modern Solution to Data Storage and Management
          Apr-29-2025
        
          
            Federal networks rely on legacy systems that aren’t designed to protect against modern cybersecurity threats nor equipped to su...
          
      Rethinking Networks for the Age of AI
          Mar-25-2025
        
          
            Agency IT environments have become increasingly complex in recent years, with employees accessing data and applications using m...
          
      How to Build a Better Endpoint Security Strategy
          Jul-21-2020
        
          
            The golden rule of security is to always be prepared. And when it comes to protecting critical cloud-based data, old tactics ju...
          
      