Views Navigation

Event Views Navigation

Today
  • New Mexico National Labs/DoD Virtual IT & Cyber Day

    The Federal Business Council (FBC) is hosting New Mexico National Labs/DoD Virtual IT & Cyber Day, a one-day event comprised of educational presentations on the latest IT and cybersecurity technologies by industry and government subject matter experts. All New Mexico government/lab personnel and government/lab contractors are welcome to attend. Why Attend: Registration is free! Receive […]

  • DISA/Joint Service Provider Virtual Cybersecurity Forum

    At DISA/JSP's 2021 Cybersecurity Forum, attendees will examine the agencies' cybersecurity readiness, learn better security practices, complete trainings, and look for technologies that can connect and protect warfighters in cyberspace. Cybersecurity in a Hyper-connected World The forum will have a focus on individuals and organizations to own their role in protecting their part of cyberspace, […]

  • Webinar: Data Management and Secure Data Storage for the Enterprise

    This free 1-hour webinar from GigaOm Research brings together experts in data management and security, featuring GigaOm Analyst Enrico Signoretti and special guest from RackTop Systems, Jonathan Halstuch. The discussion will focus on data storage and how to protect data against cyberattacks. Most of the recent news coverage and analysis of cyberattacks focus on hackers […]

  • HPE Discover 2021

    RackTop Systems is a sponsor of the HPE Discover 2021 Virtual event. About The Event In just two years, more than 50% of all enterprise data is expected to come from the edge. So get ready. Don’t miss HPE Discover 2021, packed with actionable sessions, key announcements, and much more. Who You'll Meet HPE Discover […]

  • Ransomware Protection for Unstructured Data with Cloudian

    Webinar Ransomware Protection for Unstructured Data with Cloudian To defend against ransomware, you can either prevent the attack or contain its impact. Attack prevention often involves training programs for users, advising them to avoid “phishing” attacks such as emails whose senders are posing as trusted sources. Another prevention strategy monitors emails and network activity to […]