Free online learning for government employees.

How to Bolster Your Endpoint Defenses
The proliferation of user devices has become a nightmare for cyber professionals, as they find themselves managing multiple endpoints, each with its own operating system, software versions and vulnerabilities. In this video interview, Jared Vichengrad, Head of Public Sector at Check Point Software Technologies, discusses how agencies can take a more comprehensive approach to endpoint security.
Related Videos
Jul-10-2025
As agencies look to transform their operations and services, their legacy digital communications and collaboration solutions ha...
How Digital Communication, Collaboration Service Can Transform Operations
Jul-10-2025
Legacy digital communications and collaboration services, many of which were patched together during remote work, have emerged ...
Digital Comms and Collaboration: Case Studies in Transformation
Jun-13-2025
Agencies cannot move ahead with AI at speed unless they learn to manage the risks associated with it. And failing to move ahead...
How to Minimize the Risk on the Road to AI
Jun-13-2025
Security. Data privacy. AI governance and ethics. These are some of the pressing concerns that make it difficult for agencies t...
How to Accelerate the Journey to AI
Jun-09-2025
Cloud computing appeals to agencies looking for operational and other efficiencies. But faced with cost overruns and more compl...
Cloud Security: Complex Threats, Clear Solutions
Jun-09-2025
Despite its potential for efficiencies and other savings, the cloud has proven too expensive and vulnerable for many agencies, ...
The Essentials of Cloud Data Security
Jun-06-2025
Government employees make significant use of cell phones, tablets, laptops and other mobile endpoints that connect to agency ne...
How to Secure an Agency’s Many Mobile Devices
Jun-06-2025
Mobile devices such as cell phones, tablets and laptops may boost efficiency and make government employees more productive, but...
How to Tackle Your Mobile-Device Security Risks
May-02-2025
Are government agencies putting their systems and data at risk by trying to apply the principles of risk management to cybersec...
Why It Might Be Time to Move on From Cyber Risk Management
May-02-2025
Risk management, a concept that originated in the financial sector, has not proven to be a good fit for cybersecurity, accordin...
Cyber Risk Management? A Better Bet Is Danger Management
Apr-29-2025
Federal networks rely on legacy systems that aren’t designed to protect against modern cybersecurity threats nor equipped to su...
Rethinking Networks for the Age of AI
Mar-25-2025
Agency IT environments have become increasingly complex in recent years, with employees accessing data and applications using m...
How to Build a Better Endpoint Security Strategy
Jul-21-2020
The golden rule of security is to always be prepared. And when it comes to protecting critical cloud-based data, old tactics ju...