Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: NIST
Christopher Fountain, senior vice president of SecureInfo joins host John Gilroy to talk about IT security.
July 10, 2012
The agency will hold a workshop July 25 to review the second draft of FIPS 201-2.
The Postal Service's E-Access system helps control employee access to systems and data. The single sign-on environment lets managers and database owners assign privileges to employees based on need.
On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.
NIST launched the National Cybersecurity Center of Excellence in February and now is giving industry details on how it will work. The center's goal is to bring businesses and government together to solve cyber problems.
Tags: National Cybersecurity Center for Excellence , cybersecurity , technology , Donna Dodson , industry , Curt Barker , Matt Scholl , Patrick Gallagher , Public-private partnership , Karen Waltermire , Henry Wixon , Cooperative Research and Development Agreement , Esther Carey , Federal Drive , Cybersecurity Update
T.K. Keaninni, chief technology officer for nCircle joins host John Gilroy to talk about how his company can help your agency with its network security issues.
June 26, 2012
Tags: technology , cyber attacks , cyber security , Flame , Stuxnet , advanced persistent threats , nCircle , network security , TK Keaninni , security content automation protocol , CISSP , John Gilroy , Federal Tech Talk
NIST, DHS experts say protecting smartphones and tablets shouldn't be any different than securing typical desktop or laptop computers. DHS will release mobile security reference architecture to help agencies understand common concepts. NIST is updating security control guide with 250 new requirements, including mobile controls.
Gordon Gillerman and Matt Scholl of NIST discuss standards, certification and accreditation with host John Gilroy.
June 19, 2012(Encore presentation December 25, 2012)
Jacob Taylor, a physicist at the National Institute of Standards and Technology, is a finalist for a 2012 Service to America Medal.
Big data enthusiasts from government, industry and academia are getting their hands dirty. The National Institute of Standards and Technology and the National Science Foundation held a two-day workshop recently to explore the technologies needed to collect and analyze big data. Attendees also examined how big data can enhance areas like science, health and security. The government announced in March its plans to invest $200 million dollars in the growing field.