In Depth Show Blog – May 2

On the In Depth show blog, you can listen to our interviews, find more information about the guests on the show each day, as well as links to other stories and ...

This is the In Depth show blog. Here you can listen to our interviews, find more information about the guests on the show each day, as well as links to other stories and resources we discuss.

Today’s guests:

Industry Chatter
Thursdays at 3 p.m.

Download Audio

Tiffany Jones, director of public sector strategy for Symantec, joins Industry Chatter with Francis Rose to information security and management. While many agencies are attuned to the cybersecurity threat, the concept of better managing information throughout its lifecycle is one key area that agencies may be missing, Jones said.

Click here for more

Lee Dougherty
Partner
Fluet, Huber & Hoang

Download Audio

Winning a bid protest is usually the prize companies shoot for. But protests aren’t necessarily winner-take-all. Lee Dougherty, a partner at Fluet, Huber & Hoang, joins In Depth why second place matters when it comes to bid protests.

Second place matters in protest decisions (related link)

Frank Hoffman
Senior Research Fellow, Institute for National Strategic Studies
National Defense University

Download Audio

U.S. military forces around the world are in a transition phase. The Defense Department is balancing a drawdown with a redeployment to the Pacific region. Frank Hoffman, senior research Fellow at the Institute for National Strategic Studies at the National Defense University, took part ina panel discussion at the Center for Strategic and International Studies this week to explore the situation. Hoffman joins In Depth to discuss how DoD can fit modernization efforts into the current budget uncertainty.

Beyond the Last War: Balancing Ground Forces and Future Challenges Risk in USCENTCOM and USPACOM (related link)

Chester Wisniewski
Senior Security Adviser
Sophos

Download Audio

It’s hard to patch holes in your agency’s cybersecurity shield if you don’t even know they exist, a lesson the Army is struggling with. But a seven-step solution might be all they need, according to Chester Wisniewski. He joins In Depth to discuss a recent Army inspector general report on the service’s mobile-device management strategies.

Mobile device security in the US military comes under fire (related link)


From Our Reporters:

  • Executive Editor Jason Miller on new cyber standards for iPhones, Androids and BlackBerry devices coming from the Chief Information Officers Council and the Homeland Security Department … (Click here to read his report)
  • DoD Reporter Jared Serbu on the Defense Department’s plan to roll out as many as 100,000 new mobile devices by the end of the year and a big investment in a DoD app store … (Click here to read his report)

More News:

Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.

    Army, Air Force, Navy, recruitment

    Army, Air Force ‘optimistic’ about recruitment, Navy falls behind

    Read more
    Getty Images/iStockphoto/baramee2554Retirement

    Another column on retirement. This time, I’m joining you

    Read more