12:25 pm, May 28, 2015

Search Result

Search Tags:  mobile security

Next step for DoD cybersecurity: Ditch passwords once and for all

The Pentagon led the way for the rest of the government by implementing two-factor authentication across many of its systems. But plenty of important IT infrastructure still relies on a "reckless" system that depends on passwords alone for authentication.

Tags: Mark Orndorff , On DoD , Jared Serbu , DoD , Cybersecurity , Cyber Command , online chat , Cloud computing , DISA ,

Wednesday - 01/28/2015, 09:44am EST

Bob Stevens, Vice President, Lookout Mobile Security

The number one destination for data stolen off wireless networks isn't China or Russia. It's actually the United States, according to research from Lookout Mobile Security. But they say that makes sense because of how mobile threats travel across a network. Bob Stevens is a vice president of Lookout Mobile Security and leader of their federal division. On In Depth with Francis Rose, he detailed the latest mobile security trends that can keep your agency ahead of the curve.

Tags: In Depth , Industry Chatter , Technology

Thursday - 01/22/2015, 04:17pm EST

Lots and lots of mobile stuff

Ojas Rege, vice president of Strategy for MobileIron, will explain how his company can help your agency develop its mobile strategy and manage its mobile devices.
April 22, 2014

Tags: Technology , Mobile computing , mobile device management , Cloud computing , MobileIron , Ojas Rege , Ponemon Institute , agile development , John Gilroy , Federal Tech Talk

Tuesday - 04/22/2014, 08:00pm EDT

Securing your network

Kevin Kelly, CEO of LGS Innovations, will discuss how his company can help improve network security at your agency.
December 17, 2013

Tags: Technology , IT security , network security , Kevin Kelly , LGS Innovations , Department of Veterans Affairs , John Gilroy , Federal Tech Talk

Tuesday - 12/17/2013, 07:08pm EST

Healthcare IT and the Affordable Care Act

Tony Harmon, CEO of CareDirector USA, wil discuss the interaction between technology and managed services, healthcare IT, and the Affordable Care Act.
November 5, 2013

Tags: Technology , Healthcare IT , Affordable Care Act , Managed Care Organizations , Managed services , outcome measurement , Microsoft CRM , internet technology , IT security , Tonya Harmon , CareDirector USA , John Gilroy , Federal Tech Talk

Tuesday - 11/05/2013, 08:07pm EST

Managing your agency's mobile devices

Kim Hancher, the chief information officer at the Equal Employment Opportunity Commission, will hsare her ideas on mobile device management
August 6, 2013

Tags: Technology , Mobile devices , mobile device management , enterprise tablets , Computer World , Cloud computing , BlackBerry , Bring your own device , information technology , mobile strategy , Kim Hancher , EEOC , Federal Tech Talk , John Gilroy

Tuesday - 08/06/2013, 09:30pm EDT

How to secure mobile devices at your agency

Glenn Schoonover from Koolspan will discuss mobile security with host John Gilroy.
February 19, 2013

Tags: Technology , mobile device management , smart phones , iPhone , Glenn Schoonover , Koolspan , micro SD card , encryption , mobile software , passwords , NIST , Federal Tech Talk , John Gilroy

Tuesday - 02/19/2013, 09:21pm EST

Designing web apps for federal agencies

Don Bruns, managing director at Navigation Arts, will discuss best practices for designing web apps.
January 15, 2013

Tags: Technology , mobile apps , mobile app design , Digital Government Strategy , Navigation Arts , website design , desktop services , haptic technology , responsive design , Web apps , John Gilroy , Federal Tech Talk , Don Bruns

Tuesday - 01/15/2013, 08:03pm EST

How to improve federal security

Karen Evans, partner at KE&T Partners LLC, and Julie Anderson, chief operating officer and managing director for the Civitas Group discuss what you can do to reduce the risk of cyber attacks at your agency.
January 1, 2013

Tags: Technology , security management , Cybersecurity , Karen Evans , mobile technology , KE&T Partners , Julie Anderson , Civitas Group , CSIS , Duplication , cyber attacks , John Gilroy , Federal Tech Talk

Tuesday - 01/01/2013, 09:35pm EST

Honeystick Project? Zero Day? BYOD?

Gigi Schumm, vice president and general manager Public Sector of Symantec, talks about computer security.
December 18, 2012

Tags: Technology , computer security , Cybersecurity , Gigi Schumm , Symantec , cyber attacks , Rip Tide , honeystick , zero-day vulnerabilities , BYOD , John Gilroy , Federal Tech Talk

Tuesday - 12/18/2012, 09:56pm EST
  • 1