Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.
May 08, 20142nd Panel OKs Limits on Bulk CollectionWith a second House panel approving the USA Freedom Act, Congress moves a step closer to sending the president a bill to limit the government's bulk metadata collection program, the Center for Democracy and Technology's Harley Geiger says....more0minPlay
May 08, 2014In Defense of Cybersecurity FrameworkA leader of ISACA, Sarb Sembhi, defends President Obama's cybersecurity framework, which critics contend lacks sophistication. He says detractors miss the point about how frameworks evolve....more0minPlay
May 06, 2014BYOD: Building an Effective StrategyToo many organizations have a device-centric BYOD policy that fails to look at big picture issues, including building a comprehensive strategy for protecting corporate information no matter how it's accessed, says Ian Evans of AirWatch....more0minPlay
May 06, 2014Mobile File Sharing TrendsAs members of the workforce increasingly rely on mobile devices to access corporate data, secure sharing of files becomes more challenging, says Accellion's Vidhya Ranganathan, who describes an effective strategy....more0minPlay
May 06, 2014Ponemon: Data Breach Costs RisingOn the day Target's CEO resigned in the aftermath of a massive data breach, the Ponemon Institute issued its 2014 Cost of Data Breach Study, which Chairman Larry Ponemon says helps explain why CEOs should be more involved in breach preparedness and response....more0minPlay
May 05, 2014Fighting Threats with Behavioral AnalysisA behavioral analysis approach to fighting malware can be more effective than a signature-based approach in the current threat environment, contends Webroot's Patrick Kennedy....more0minPlay
May 05, 2014The Next Generation of EncryptionVoltage Security's Mark Bower contends data-centric security can help break down barriers to the widespread use of encryption and help protect sensitive information, including credit card numbers....more0minPlay
May 05, 2014Using Network 'Situational Awareness'Network "situational awareness" can help organizations in all business sectors improve regulatory compliance by identifying networks and devices that need protection, says Lumeta's Reggie Best....more0minPlay
May 02, 2014Cybersecurity: Taking an Economic ViewHurt the criminals and cyberthreats will decrease. That's how organizations in all sectors, working with law enforcement, should approach cybersecurity, says Juniper Networks' Kevin Kennedy....more0minPlay
May 02, 2014Authentication and the IndividualIndividuals resort to lying about themselves to protect their identities when accessing systems in today's imperfect cyber world, says Peter Tapling, president of Authentify, an out-of-band authentication service....more0minPlay
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.