• Agencies still struggling to encrypt mobile devices

    Despite a 2006 mandate to secure mobile devices and implement two-factor authentication, only just over half of federal agencies have managed to do so. OMB submits its annual FISMA report to Congress detailing the steps the government has taken to improve cybersecurity, including spending $12 billion on cybersecurity last year.

  • How to protect your agency’s mobile devices from hackers

    Host John Gilroy is joined by John Bordwine, public sector CTO at Symantec. They will discuss ”Endpoint” security and how it applies to mobile technology. June 7, 2011

  • FBI: Encryption key for cloud security

    The FBI’s Criminal Justice Information Services says local law enforcement needs to encrypt its data if it wants to join the cloud. The FBI said when information is encrypted from the start, police can have control of its cybersecurity on any cloud system, according to a post on InfoSecurity.

  • Encrypted laptops ease VA’s concerns about data breaches

    Department says 99 percent of laptops now are encrypted. Of the 21 laptops reported stolen or missing in the last two months, all were secured with security software.

  • Chuck Archer: OPM cyber cloud has a silver lining

    The OPM cyber attack may turn out to have a silver lining. The attack may give agencies an opportunity — if they choose to take it — to redefine encryption. Chuck Archer is the executive chairman at Covata and former assistant director of the Federal Bureau of Investigation. He tells In Depth with Francis Rose that encryption isn’t a people problem.

  • Data encryption & security management

    Wayne Lewandowski, vice president, US Federal Sales, Vormetric, joins host John Gilroy to discuss his company’s 2016 Data Threat Report, data encryption, and managing security in the federal government. March 29, 2016

  • Encryption a priority at the Air Force

    “We encrypt almost everything,” Frank Konieczny, chief technology officer of the U.S. Air Force, said on Federal News Radio’s In Focus. “Probably close to 100 percent, if not 100 percent, within the Air Force domain right now, because you have to. Now the question becomes, when do you decrypt to look at everything else? And we do it at the application level or at the endpoint level, user endpoint level, so we don’t like decrypting in the middle because that just adds another factor or problem area for incident reporting.”

  • Cloud security, network visibility & more

    Blue Coat Systems Federal CTO Aubrey Merchant joins host John Gilroy to discuss Cloud Access Security, network visibility, and lifecycle security. July 19, 2016

  • Managing security in an encrypted world

    F5 Networks’ Lou Giglio, Jeff Deal, and Ron Cochran join host John Gilroy on this week’s Federal Tech Talk to discuss encryption and it’s role in consumer security. September 13, 2016

  • Technology in work boots

    Caring Village CEO and Co-Founder Mike Behrmann, and Jennifer Taylor, executive vice president of Sales and Marketing, join host John Gilroy to discuss applied technology and how it can help federal IT professionals. November 22, 2016