Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.
January 07, 2014Why Training Doesn't Mitigate PhishingTraining that's designed to help workers avoid clicking on links from spear-phishing e-mails may be ineffective because employees often fail to read training materials, says Eric Johnson, a Vanderbilt University professor who's co-author of a new study on the subject....more0minPlay
January 06, 2014Background Screening: Top 10 TrendsThe new year's top trends in background screening can be summed up in two words: legal and compliance. Les Rosen of Employment Screening Resources offers expert tips for more effective screening....more0minPlay
January 03, 2014FIDO's 2014 Authentication AgendaTo help reduce reliance on passwords, the FIDO Alliance is developing standard technical specifications for advanced authentication. Michael Barrett and Daniel Almenara of FIDO describe the impact the effort could have in 2014....more0minPlay
January 03, 20142014 Cybersecurity ForecastAs a result of high-profile breaches, such as the Target incident, security is increasingly a board issue. What are the key topics security leaders should prepare to discuss in 2014? Alan Brill of Kroll offers his forecast....more0minPlay
December 30, 20135 Resolutions for IT Security Pros2014 may well be the "Year of Security," and IT security pros must prepare now for new job demands. ISACA's Robert Stroud offers five New Year's resolutions to help prepare for 2014's security trends....more0minPlay
December 27, 2013Reworking Framework's Privacy ApproachA preliminary version of the cybersecurity framework takes a too-broad approach to privacy, says security and privacy attorney Harriet Pearson. And that could result in fewer organizations adopting the voluntary security guidelines....more0minPlay
December 26, 2013Improving the Way to Manage RiskWhile preparing a speech to be delivered in Korea, NIST's Ron Ross wanted to convey the message of the importance of computer security. He hit on five themes - threat, assets, complexity, integration and trustworthiness - which form the acronym TACIT....more0minPlay
December 23, 2013Target Breach: A Watershed EventThe breach at Target stores that may have affected as many as 40 million credit and debit card account holders is a watershed moment that could greatly raise awareness of cybersecurity risks, says privacy attorney David Navetta....more0minPlay
December 19, 2013ENISA on the New Threat LandscapeCyberthreats increasingly target mobile devices, and simple security measures could help end-users slash these incidents by 50 percent. This is the key finding of ENISA's new Threat Landscape Report, says Louis Marinos, the prime author....more0minPlay
December 18, 2013EMV: The Outlook for 2014While the U.S. migration toward EMV card technology may have been jolted by a July court ruling, Randy Vanderhoof of the Smart Card Alliance contends the movement toward EMV will accelerate in 2014....more0minPlay
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.