Sinopsis
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
GovInfoSecurity.com Week In Review for Sept, Sept. 10, 2010
10/09/2010This week's top news and views: 5 Critical Elements of Cloud Framework. And don't miss our audio week-in-review podcast by Executive Editor Eric Chabrow.
-
Is Infosec Worker Need Underestimated?
07/09/2010"If we don't have human capital in place, the other stuff is not going to work," says Patrick Gorman, former associate director of the Office of National Intelligence. "It is the most critical piece of cybersecurity."
-
Editor's Choice for August: Senate Tackles Cybersecurity Bill, DoD Infosec Strategy, U.S.-CERT, State CISOs
05/09/2010An audio review of some of the most compelling content posted on GovInfoSecurity.com in August.
-
GovInfoSecurity.com Week In Review for Friday, Sept. 3, 2010
03/09/2010U.S. Cyber Challenge Metrics; Einstein 2; Misinformation on Cybersecurity Bill
-
Risk Management and Social Media
31/08/2010Interview with Jonathan Teich, M.D., assistant professor of medicine at Harvard, on social media and security.
-
Reasoning Behind Enhancing DHS Infosec Prowess
30/08/2010Sen. Tom Carper addresses a prospective Senate cybersecurity bill and its chances of passage in 2010.
-
Senator Gives White House 'Incomplete'
on Cybersecurity Performance30/08/2010Sen. Tom Carper recognizes the tough job the Obama administration faces in securing IT.
-
GovInfoSecurity.com Week In Review for Friday, Aug. 27, 2010
27/08/2010Week In Review: Cybersecurity Bill as Rider to Defense Act, DoD's New IT Security Strategy, The Cloud: A More Secure Environment?
-
Intrusion Detection: Analyzing Data Proves Valuable
27/08/2010Michigan CIO Ken Theis on state's implementation of Einstein 2 intrusion detection system.
-
DoD Unveils New Cyber Defense Strategy
26/08/2010Defense Deputy Secretary William Lynn III briefs the media on the Department of Defense's new strategy to defend military IT networks and a 2008 incident in which an assailant breached a classified military network.
-
The Cloud: A More Secure Environment?
25/08/2010NASA's Tom Soderstrom: Cloud can be more secure than other forms of IT.
-
IBM Names Top Trends, Risks
25/08/2010Tom Cross of IBM on the X-Force 2010 Mid-Year Trend and Risk Report.
-
Michigan Eyes Hosting Own Cloud Data Center
24/08/2010CIO Ken Theis Discusses Cloud Security and Its Economic Impact
-
NASA's JPL Reaches for the Cloud
23/08/2010CTO Tomas Soderstrom on the benefits the space agency will realize from cloud.
-
GovInfoSecurity.com Week In Review for Friday, Aug. 20, 2010
20/08/2010Searching for the Good Hacker, Personal Tale of Account Takeover, Gov-Biz Info Sharing
-
Cracking Down on ID Theft
17/08/2010Kim Peretti of PricewaterhouseCoopers on how U.S. courts are applying tougher sentences to cybercrimes.
-
The Fundamentals of Risk Management
13/08/2010Debbie Christofferson of the Information Systems Security Association on risk management trends, career opportunities.
-
GovInfoSecurity.com Week In Review for Aug. 13, 2010
13/08/2010Week In Review: U.S.-CERT Director's First Year on Job, State CISOs' Critical Skills, NASA Cloud Initiative
-
Altruistic CISOs Employ Their Smarts to Succeed
11/08/2010Marilu Goodyear On the Emerging Role of State CISOs.
-
PCI Update: 'No Surprises'
09/08/2010Interview with Bob Russo, GM of the PCI Security Standards Council, on the Pending Release of the 2010 PCI DSS Update.