Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,250 episodes available.
January 10, 2020Quantum-Proof Cryptography: How It Would WorkResearchers are attempting to develop new forms of cryptography that could not be cracked by powerful quantum computing devices that are in the works. Divesh Aggarwal, principal investigator at Singapore's Center for Quantum Technologies, describes the efforts....more0minPlay
January 09, 2020CCPA: Who in Healthcare Must Comply?Healthcare organizations need to carefully assess whether data they hold falls under the scope of the California Consumer Privacy Act, says attorney Anne Kimbol, assistant general counsel of HITRUST - especially now that the regulation's Jan. 1 compliance deadline has hit....more0minPlay
January 08, 2020Moving from Vulnerability Management to ResponseComplex, manual processes and disparate, disconnected tools make it difficult for security and IT teams to mount a cohesive response. Bryce Schroeder of ServiceNow discusses a more effective approach to vulnerability response....more0minPlay
January 07, 2020Preparing for Potential Iranian 'Wiper' AttacksIn the wake of the killing of an Iranian general in a U.S. drone attack last week, organizations - especially healthcare entities and units of government that have been vulnerable to ransomware attacks - need to be on guard against destructive "wiper" attacks, says Caleb Barlow of CynergisTek....more0minPlay
January 07, 2020Assessing The Maturity of Zero Trust Across OrganizationsZero Trust has become a cybersecurity marketing buzzword. But Kelsey Nelson of Okta sheds light on the realities of the Zero Trust approach, with a specific focus on the identity and access management component of the strategy....more0minPlay
January 06, 2020Global Cyber Alliance President on Iranian Cyber ThreatFrom past roles at the Department of Justice, Department of Homeland Security, Microsoft and Sony, Phil Reitinger has learned more than a thing or two about nation-states and cyber threats. In this exclusive interview, the head of the Global Cyber Alliance discusses how to respond to potential new threats from Iran....more0minPlay
January 06, 2020Iran's Cyber Response: 'They're Going to Unleash the Hounds'Following the U.S. killing of Iran's Maj. Gen. Qasem Soleimani last week, security experts have warned of possible retaliatory cyber strikes. Tom Kellermann of VMware believes those attacks are imminent. "The period of mourning is over, and I think the holy war in American cyberspace is yet to begin."...more0minPlay
January 03, 2020Analysis: Countering Nation-State Attacks in 2020The latest edition of the ISMG Security Report discusses countering the threat of nation-state cyberattacks in 2020. Also featured: an update on France's experiment with facial recognition technology and sorting out what "zero trust" really means....more0minPlay
December 31, 2019How Can Credential Stuffing Be Thwarted?Credential stuffing is a growing problem that's difficult to address, says Troy Hunt, creator of the Have I Been Pwned data breach notification service, who sizes up mitigation efforts....more0minPlay
December 31, 2019Health Data Security: Federal, State Trends for 2020While Congress is unlikely to pass major new national cybersecurity legislation in an election year, federal regulators and state attorneys general will be busy addressing evolving health data privacy and security issues in 2020, predicts attorney Marcus Christian of the law firm Mayer Brown....more0minPlay
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,250 episodes available.