Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,285 episodes available.
March 03, 2017How Will Europe's GDPR Affect Businesses Worldwide?The European Union's General Data Protection Regulation, which will be enforced beginning in May 2018, will affect organizations throughout the world because it applies to any company that handles Europeans' personal data, says Fred Kost of HyTrust....more0minPlay
March 03, 2017Howard Schmidt Dies; Creating CyberSec Framework MetricsLeading the latest edition of the ISMG Security Report: The death of former White House Cybersecurity Coordinator Howard Schmidt, and a report on legislation to strengthen the influence of the National Institute of Standards and Technology on federal civilian agencies....more0minPlay
March 02, 2017Using the Cloud to Make Enterprises Less ComplexThe cloud can be used to improve security by helping to separate data from applications, networks and other infrastructure, says VMware's Tom Corn....more0minPlay
March 01, 2017FDA: Dispelling Medical Device Cybersecurity MythsIn an in-depth interview, the Food and Drug Administration's Suzanne Schwartz, M.D., dispels some myths about the FDA's regulatory activities and expectations on the cybersecurity of medical devices....more0minPlay
February 28, 2017Giving Fraudsters a Taste of Their Own MedicineIn the latest edition of the ISMG Security Report: Analyzing how reflective social engineering can battle cybercriminals who use social engineering to fool users into divulging personal information....more0minPlay
February 27, 2017Creating a Hack-Proof ComputerThe technology and know-how exists to build a hack-proof computer, but doing so won't be easy, says Howard Shrobe, principal research scientist at the Massachusetts Institute of Technology's Computer Science and Artificial Intelligence Laboratory....more0minPlay
February 24, 2017LeakedSource's Demise: Lessons LearnedPaid breach notification site LeakedSource has disappeared. Given the site's business model - selling access to stolen credentials to any potential buyer - breach notification expert Troy Hunt says the site's demise is no surprise....more0minPlay
February 24, 2017Battling Mobile Banking AttacksAttackers are increasingly targeting mobile channels, driving banks to seek better ways of verifying the authenticity and integrity of not just users, but also mobile devices and transactions, says John Gunn of cybersecurity technology firm Vasco Data Security....more0minPlay
February 24, 2017Moving Away from Checkbox ComplianceLeading the latest version of the ISMG Security Report: a look at how various sectors are moving away from checkbox compliance, instead taking proactive measures to secure their information assets. Also, big increase in e-commerce fraud and Yahoo's costly breach....more0minPlay
February 24, 2017Dark Web: 5 Things to KnowWhat's required to access the Dark Web? And how does one separate fact from fiction? These are two of the five things Dark Web users need to know, says Danny Rogers, co-founder and CEO of Terbium Labs....more0minPlay
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,285 episodes available.