Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Monday - Friday, 4-7 p.m.
In Depth with Francis Rose features daily interviews with top government executives and contractors. Listen live from 4 to 7 p.m. or download his archived interviews below.
In Depth interviews - July 10
Wednesday - 7/11/2012, 1:20am EDT
Hildy Ferraiolo — Scientist, Computer Security Division, NIST
More than 90 percent of federal employees have now been issued standardized smart ID cards under Homeland Security Presidential Directive 12 (HSPD-12). The cards are supposed to let users gain secure authentication into IT systems, and in some cases physical access into buildings, though agencies are in various stages of implementing those cards' capabilities.
But those cards capabilities will evolve a bit under draft standards being proposed by the National Institute of Standards and Technology. You'd be able to remotely reset your PIN code, your card would store a digital image of your face for extra security and you'd even be able to migrate your security credentials onto your mobile device.
Tom Shoop — Editor-in-Chief, Government Executive
Even though telework participation is at an all-time high, agency participation still varies greatly.
But could there be a hidden reason why your agency does or does not encourage the practice? Tom Shoop, editor-in-chief of Government Executive recently wrote a column on the issue, titled "Trust and Telework."
George Tubin — Senior Security Strategist, Trusteer
Twelve people scattered around the world were arrested two weeks ago for credit card fraud via the Internet. It was the largest international move to catch people committing so-called "carding" crimes.
The move was coordinated by the FBI, but some people say it's not a sign of safer days to come, according to a GovInfoSecurity.
George Tubin, a senior security strategist for the online security provider Trusteer, discusses why.
This story is part of Federal News Radio's daily Cybersecurity Update. For more cybersecurity news, click here.
Brendan McGarry — Bloomberg Government reporter
In early June, Lockheed Martin, the Pentagon's — and the world's — biggest defense contractor, nabbed a missile contract worth more than $2 billion dollars from the Missile Defense Agency.
Bloomberg Government lists it as DoD's biggest contract for June. In total, Lockheed locked down almost a third of the contract dollars DoD awarded for the month.
Brendan McGarry, a reporter at BGov covering this story, joins In Depth to discuss the contract.
This story is part of Federal News Radio's daily DoD Report. For more defense news, click here.
Also on the show: