Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.
June 19, 2015Tapping Analytics In CyberSec, FraudThe Big Data explosion will expand in volume, velocity and variety. Analytics are key to deriving insights from this data, particularly in cybersecurity and anti-fraud, says Dominic Ligot of Teradata Philippines....more0minPlay
June 18, 2015Securing Homegrown Mobile AppsEnterprise developers are under pressure to produce quickly mobile apps, often leaving security as a second thought. Denim Group's John Dickson suggests ways to make security a priority....more0minPlay
June 17, 2015Disrupting Attacks With Kill ChainsThreat intelligence is increasingly being brought to bear to help businesses apply kill-chain concepts, focusing on disrupting discrete parts of online attacks as early as possible, says Fortinet's Simon Bryden....more0minPlay
June 17, 2015The Rise of Trusted Online IdentitiesWhat's your digital identity strategy? Numerous agencies in countries across Europe - such as the Italian postal service - are creating new approaches to verifying identities and allowing them to be used as a trusted service, says CA's Paul Briault....more0minPlay
June 16, 2015Enterprise Risk: Internet of ThingsThe Internet of Things is posing an increased risk to all organizations. One global data center provider, for example, recently discovered that its malware-infected power supplies were part of a botnet, says Chris Richter of Level 3 Communications....more0minPlay
June 15, 2015How CIOs Must Prioritize DefensesThe list of information security threats facing organizations continues to grow longer. But it's up to CIOs to put the right defenses - and priorities - in place, says David White at BAE Systems Applied Intelligence....more0minPlay
June 12, 2015Path to Privileged Access ManagementWary of intrusions, data compromise and theft, organizations increasingly are deploying privileged access management solutions. Idan Shoham of Hitachi ID Systems offers the essential do's and don'ts....more0minPlay
June 12, 2015Tracking Missing DevicesKeeping track of missing devices is a critical aspect of information security. Ali Solehdin, senior product manager at Absolute Software, discusses Computrace, which helps organizations secure endpoints and the sensitive data those devices contain....more0minPlay
June 12, 2015Inside the Inception APT CampaignChristophe Birkeland, CTO of malware analysis for Blue Coat Systems, was part of the team that discovered the Russia-targeting Inception campaign, and says the hunt for new APT attacks remains ongoing....more0minPlay
June 12, 2015Navy Red-Team Testing Moves to BusinessEdgeWave's Mike Walls, a former bomber pilot who led Navy red teams, says penetration testing is useful in analyzing bits and bytes but not the readiness of operations under attack from cyberspace. Red teams, he says, can analyze the impact on operations....more0minPlay
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.