bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
3:43 pm, March 26, 2015

Search Result

Search Tags:  Tom Karygiannis

CIO Council to approve one standard for mobile app vetting

The Defense Department's National Information Assurance Partnership's (NIAP) protection profile will be the governmentwide standard for agencies to use when ensuring the security of mobile apps. The Mobile Technology Tiger Team recommended the NIAP approach because of the collaboration and coordination across government and with industry.

Tags: technology , mobile computing , Derived credentials , cybersecurity , Rob Palmer , DHS , Jeanne Peterson , National Information Assurance Partnership , NIST , Greg Youst , DoD , DISA , Mike McCarty , HSPD-12 , MobileGov , Jason Miller

Thursday - 02/19/2015, 04:02am EST

Tom Karygiannis, National Institute of Standards and Technology

It seems like the whole world is going mobile, and that includes the federal government. Agencies are using more and more apps for collaboration and productivity. But some apps increase the potential for exposing government data. To help you guard against these security risks, the National Institute of Standards and Technology is providing tips to the federal community for vetting third-party apps. Computer Scientist, Tom Karygiannis, joined Tom Temin on the Federal Drive to discuss the guidelines.

Tags: NIST , Federal Drive , Tom Temin

Thursday - 08/28/2014, 10:06am EDT
Listen

Federal mobile apps lack standard security processes

DHS, DISA and GSA are heading down similar but different paths to ensure mobile apps are secure before being allowed on devices or networks. NIST is developing voluntary guidelines to improve mobile software security based on work done in other industry sectors.

Tags: technology , DHS , Robert Palmer , DISA , Christine Dillman , NIST , Jacob Parcell , GSA , cybersecurity , mobile computing , AFCEA , Jason Miller

Wednesday - 06/26/2013, 05:18am EDT
Listen

Tom Karygiannis

Tags:

Thursday - 09/06/2012, 12:28am EDT

NIST gives agencies tips to secure mobile devices

New guidelines could help agencies adopting bring-your-own-device strategies manage the potential risks smartphones and tablets could pose.

Tags: best practices , cybersecurity , NIST , In Depth , mobile computing , Bring your own device , Keith BieryGolick

Wednesday - 07/18/2012, 06:29am EDT
Listen

In Depth interviews - July 16

On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.

Tags: In Depth , Francis Rose , Dorine Andrews , Causey Awards , Richard Boly , State Department , David Powner , GAO

Tuesday - 07/17/2012, 01:27am EDT