Sinopsis
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Cybersecurity: Firewalls Are Easy to Pierce
15/02/2011The 451 Group's Joshua Corman says merely complying with stagnant standards won't ensure security.
-
Placing in Context Infosec Skills Gap
14/02/2011Attracting and retaining IT security professionals may be the No. 1 staffing challenge states face, but the numbers alone unveiled in a recent National Association of State Chief Information Officers survey don't tell the whole story.
-
GovInfoSecurity.com
Week In Review
for Feb. 11, 201111/02/2011This week's top news and views: Feds to Require PIV to Access Data and Facilities; President Obama is praised for work on cybersecurity.
-
ID Fraud Costs on the Rise
08/02/2011Javelin's Van Dyke says the cost of managing ID fraud is growing exponentially.
-
Lauding the President on Cybersecurity
08/02/2011The Commission on Cybersecurity for the 44th Presidency co-chair praises the president's commitment, but says much more work needs to be done to develop a strategy to combat cyber threats.
-
"Allow by Default, Deny by Exception"
07/02/2011Dennis Devlin of Brandeis University knows the difference between training and education.
-
GovInfoSecurity.com
Week In Review
for Feb. 4, 201104/02/2011This week's top news and views: NIST issues new guidance on securing public cloud; Senators say no Internet kill switch in their bill; Commission on Cybersecurity for the 44th Presidency sees slow progress; and ex-federal CIO and mom Karen Evans on computer security and kids.
-
Breach Disclosure: New Laws, Higher Standard
03/02/2011Wells Fargo's Alexander says breach disclosure laws are getting tougher.
-
The Merits of Cyberweaponry
01/02/2011"Once you get over the idea that we don't have permanent world peace, and people may need to attack each other in particular circumstances ... then maybe there's a lot of good things to say about cyberweapons," says Peter Sommer of the London School of Economics' Information Systems and Innovation Group.
-
73-Hospital System Sets Security Goals
01/02/2011Sheryl Rose, the first chief information security officer at Catholic Health Initiatives, is leading efforts to implement a comprehensive security strategy as the organization rolls out electronic health records.
-
The ROI of Security Compliance
31/01/2011Tripwire's Shenoy says security compliance improves the bottom-line.
-
GovInfoSecurity.com
Editor's Choice
for January 201128/01/2011January's top news and views: top 10 government IT security influencers for 2011, state battles data leakage, giving non-IT managers ownership of IT risk and surveying government IT security practitioners.
-
Selecting a Data Loss Prevention App
27/01/2011Security specialist Rebecca Herold says data loss prevention software can play a critical role in preventing information breaches.
-
Beware of Social Media for Screening
25/01/2011Employment Screen Resources' Lester Rosen says there's no hotter trend in background screening than social media. But just as social networks can be used to screen applicants, they also can be abused.
-
GovInfoSecurity.com
Week In Review
for Friday, Jan. 21, 201121/01/2011This week's top news and views: Parsing the definition of cyberwar, taking the pulse of government IT security and addressing ways to deploy secure cloud computing services.
-
Cyber Terrorism: How to Fight Back
21/01/2011Cyber terrorism can happen to you, and probably will, says G.F. Bryant Jr. of the World Institute for Security Enhancement.
-
The Mobile Chip and EMV
20/01/2011Philip Andreae is optimistic the U.S. will adhere to a global standard, but the method could vary from the norm.
-
National Breach Warning System Urged
17/01/2011When a database breach occurs, consumer notification continues to be a public problem, and it's time for the federal government to step in, says Linda Foley, co-founder of the non-profit Identity Theft Resource Center.
-
Cryptography in the Cloud
14/01/2011Ralph Spencer Poore: There's no better way to secure critical data than through cryptography, especially when that data is stored in the cloud.
-
GovInfoSecurity.com
Week In Review
for Friday, Jan. 14, 201114/01/2011This week's top news and views: IT employment ends 2010 near a two-year high; IT security jobs are on the rise in 2011; and giving non-IT executives the responsibility for IT risk.