Government Information Security Podcast
- Autor: Vários
- Narrador: Vários
- Editor: Podcast
- Mas informaciones
Informações:
Sinopsis
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Selecting a Data Loss Prevention App
27/01/2011Security specialist Rebecca Herold says data loss prevention software can play a critical role in preventing information breaches.
-
Beware of Social Media for Screening
25/01/2011Employment Screen Resources' Lester Rosen says there's no hotter trend in background screening than social media. But just as social networks can be used to screen applicants, they also can be abused.
-
GovInfoSecurity.com
Week In Review
for Friday, Jan. 21, 201121/01/2011This week's top news and views: Parsing the definition of cyberwar, taking the pulse of government IT security and addressing ways to deploy secure cloud computing services.
-
Cyber Terrorism: How to Fight Back
21/01/2011Cyber terrorism can happen to you, and probably will, says G.F. Bryant Jr. of the World Institute for Security Enhancement.
-
The Mobile Chip and EMV
20/01/2011Philip Andreae is optimistic the U.S. will adhere to a global standard, but the method could vary from the norm.
-
National Breach Warning System Urged
17/01/2011When a database breach occurs, consumer notification continues to be a public problem, and it's time for the federal government to step in, says Linda Foley, co-founder of the non-profit Identity Theft Resource Center.
-
Cryptography in the Cloud
14/01/2011Ralph Spencer Poore: There's no better way to secure critical data than through cryptography, especially when that data is stored in the cloud.
-
GovInfoSecurity.com
Week In Review
for Friday, Jan. 14, 201114/01/2011This week's top news and views: IT employment ends 2010 near a two-year high; IT security jobs are on the rise in 2011; and giving non-IT executives the responsibility for IT risk.
-
PCI Compliance: Improvements Needed
12/01/2011Most industries say PCI is improving payment card security, but driving consumer and employee awareness about vulnerabilities remains a challenge.
-
The History of EMV
11/01/2011Philip Andreae was there when EMV was born, and he plans to see the EMV evolution through, until it becomes a global standard embraced throughout the world.
-
Giving Non-IT Execs Onus for IT Risk
11/01/2011Executives deal with risk all of the time, except that is, information technology risk. For many non-IT leaders in government and business, IT risk is outside their comfort zone. Oregon CISO Theresa Masse wants to change that.
-
Top Security & Privacy Topics of 2011
10/01/2011When it comes to sizing up the privacy agenda for 2011, the tone at the top of organizations is all about improving data security, says privacy expert and lawyer Lisa Sotto.
-
GovInfoSecurity.com Week In Review for Friday, Jan. 7, 2011
07/01/2011This week's top news and views: Conscripting cybersecurity experts to protect IT, State battles data leakage and President Obama signs bill to reorganize the National Institute of Standards and Technology.
-
The Social Media Challenge
06/01/2011To Brian Lapidus, COO of Kroll's Fraud Solutions group, the main threat to data security can be summed up in two words: social networking.
-
R&D Focuses on Finding Data in Cloud
03/01/2011Researchers explore adapting geolocation technology to identify where data reside on the cloud so organizations can comply with IT security laws and regulations, RSA Chief Technology Officer Bret Hartman says.
-
GovInfoSecurity.com
Editor's Choice for December 201031/12/2010This month's most compelling news and views: top 10 government IT security stories of 2010, four components on the insider threat, pragmatic optimist Howard Schmidt and failure to enact major cybersecurity bill foreseen. And don't miss our audio week-in-review podcast by Executive Editor Eric Chabrow
-
8 IT Security Threats for 2011
28/12/2010Dmitri Alperovitch, McAfee Labs threat research vice president, discusses the company's annual threat predictions, saying: "We are seeing an escalating threat landscape in 2011."
-
The Age of 'Involuntary Transparency'
27/12/2010"The environment that started by supporting whistleblowers ... is essentially morphing into 'Gee, we as an organization need to be completely transparent, whether we want to or not,'" says Cal Slemp, managing director of Protiviti.
-
4 Components of the Insider Threat
22/12/2010Thwarting the insider threat entails more than knowing an individual with access to a computer, but to recognize the synergy between the individual, organization, technology and environment, I3P Research Director Shari Lawrence Pfleeger says.
-
Global Security Challenges for 2011
22/12/20102011 will be the year of more -- more sophisticated malware, more WikiLeaks-style breaches and more regulatory compliance headaches.