Security News Podcast features information security specialist Ira Victor and award-winning journalist Samantha Stone in a fast-paced news program about data security, the law, and the digital underworld. Your security depends on these weekly updates, with topics spanning data confidentiality, disaster recovery, encryption, open source and more.
…
continue reading
A show that takes the two dullest subjects in the world, government and technology, and makes them irresistibly relevant and undeniably fascinating. (Trust us!) From blockchain and civic-tech startups in smart cities to public policy in a world of autonomous vehicles and always-on AI, GOVTECH 360 covers the collision of tech and the future of states and localities. From the award-winning editors at Government Technology.
…
continue reading
Bianca Lochner tells govtech.com about the city building an app to better manage short-term rentals.
…
continue reading
Dave Christopher tells govtech.com about his organization's goals, demystifies data science and brings a fresh take to the power of inclusive hiring.
…
continue reading
Amy Tong tells govtech.com about what lead her to government IT work and the unique challenges of leading the public sector IT community in a large state.
…
continue reading
1
GovTech Top 25 Doers, Dreamers & Drivers for 2020
43:47
43:47
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
43:47
GovTech Editors Noelle Knell and Ben Miller take listeners through the professional and personal backstories of a handful of honorees of the Class of 2020 - including Rick Smith (Axon), Jordan Davis (Smart Columbus), Yessica Jones (Arkansas), Anne Schwieger (Boston) and Curt Wood (Massachusetts). Read about and see all 25 at govtech.com. Special th…
…
continue reading
1
Expensive Hacks, Better Bathrooms and GT Abroad
11:35
11:35
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
11:35
It’s been a little over a month since a ransomware attack took out Baltimore’s IT services and cost millions of dollars to recover from. GovTech reporter Lucas Ropek helps break down what happened, how the city could have responded differently, and the potential advantages and pitfalls of paying a ransom. Then, Paul talks to the founder of Good2Go,…
…
continue reading
1
GovTech360 Data Dive: The Changing Face of Government CIOs
11:09
11:09
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
11:09
What’s the most common name of state CIOs? How many men and women have held the job? And is it true that CIO could also stand for Career Is Over? Tune in for our data-driven look at more than 200 state tech chiefs. Those who aspire to become a state chief information officer might consider changing their name to Jim. And it wouldn’t hurt if they br…
…
continue reading
1
Rapid Round: Blockchain Architect, Space-based Broadband and Gender-biased AI
7:25
7:25
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
7:25
On a GovTech360 Rapid Round from the Market Navigator Studios, , we begin in Colorado where the state has named a dedicated blockchain architect to bolster its cybersecurity stance and guide it into the future. From there, amid all the 5G excitements, we look up to near space earth orbit for the future of broadband. And if your agency is using AI v…
…
continue reading
1
Agile Millennials and American-Style Privacy
17:35
17:35
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
17:35
The debut episode of GovTech360 features two GT Doers, Dreamers and Drivers.From the Market Navigator Studios, we talk to Nebraska Chief Information Officer Ed Toner and Seattle Chief Privacy Officer Ginger Armbruster about their award-winning work. Show Notes: - Growing your own Agile development team of millennials who code @ 1:58. - Organic Agil…
…
continue reading
From the award winning editors of Government Technology, a fresh look at where government is going.
…
continue reading
1
Security News Podcast Episode 9: Interview with Bryan Sartin of Verizon Business, and an Important Program Announcement
18:57
18:57
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
18:57
Interview with Bryan Sartin of Verizon BusinessImportant Program AnnouncementPodcast sponsored by DeviceLockDownload Show Notes/Links for Episode 9 at http://datasecurityblog.comद्वारा Ira Victor with Samantha Stone
…
continue reading
1
Security News Podcast Episode 8: eDiscovery, breach notification, PCI 6.6 and web security
25:59
25:59
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
25:59
eDiscovery Strategies NeededMontgomeryWard waits six months to alert 51,000 customers of credit card data breachMore on the changes in mandates to protect credit card security in PCI rule 6.6, plus tips on more secure web surfing Podcast sponsored by DeviceLock and Emergency Management Magazine.द्वारा Ira Victor with Samantha Stone
…
continue reading
1
Security News Podcast Episode 7: eVoting security, stolen medical data, new credit card security mandates
30:03
30:03
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
30:03
E-Vote: Voting Machine Industry Says Federal Regulatory Process BrokenFinjan Discovers more than 500 Mb of Stolen Medical, Business and Airline Data on Crimeware Servers in Argentina and MalaysiaChanges in section 6.6 of the PCI credit card security standardPodcast sponsored by DeviceLock and Emergency Management Magazine.…
…
continue reading
1
Security News Podcast Episode 6: Disaster scams, municipal wireless security, fight spam with reCAPTCHA
37:27
37:27
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
37:27
SANS warns of potentially harmful Iowa storm video scamsUsing out-of-the-box thinking to secure the wireless network for Wisconsin police departmentsUsing reCAPTCHA to fight spam bots and help librariesPodcast sponsored by DeviceLock and Emergency Management Magazine.द्वारा Ira Victor with Samantha Stone
…
continue reading
1
Security News Episode 5: Ransomware with 1024-bit keys; Attacks hiding in data streams; Policy guidelines from GFIRST Security Conference
35:19
35:19
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
35:19
Ransomware hold data hostage with strong 1024-bit keyNew report show spike in attacks hidden in innocent-looking internet trafficSecurity policy guidelines from GFIRST Security Conference 08, OrlandoPodcast sponsored by DeviceLock and Emergency Management Magazine.द्वारा Ira Victor with Samantha Stone
…
continue reading
1
Security News Episode 4: Flash Patch, Comcast Attack, and FBI's Infraguard.
30:49
30:49
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
30:49
Patching the browser-based Adobe Flash hole. The Comcast attack, it's not what you might think FBI's InfraGard Member Alliance, and it's security missionPodcast sponsored by DeviceLock and Emergency Management Magazine.द्वारा Ira Victor with Samantha Stone
…
continue reading
1
Security News Episode 3: Craigslist scammers, hacking through printers, and eDiscovery.
33:31
33:31
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
33:31
Scammers and spammers inundating Craigslist?"Hacking" through the printers? We ask an expert from HP.Study sheds light on the eDiscovery challenges organizations face. We interview a security researcher that worked on the study.Plus this week's news on data security, the law, and the digital underworld.Podcast sponsored by DeviceLock and Emergency …
…
continue reading
1
Security News Episode 2: InfoSec News, Open Source Security, Spammers Leverage Popular eMail Services
27:40
27:40
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
27:40
This week's news on data security, the law, and the digital underworld.Over 500,000 open source-driven web sites could be infecting visitors with malicious attacks. We interview Jamz Yaneza, Threat Research Manager with Trend Micro, Inc.Have spammers figured out a new way to use popular email services to send out more waves of spam? We talk with Ma…
…
continue reading
1
Security News Episode 1: InfoSec News, Mash-Up Security, Public eRecords Integrity
32:35
32:35
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
32:35
Millions of emails missing from the White House, and the explanation is not necessarily political. What's a mash-up? A great way to offer lots of information in one place. David Bolker, cofounder of the OpenAjax Alliance, and CTO of IBM Emerging Internet Technologies explains how mash-ups challenge security. Public eRecords integrity with Anne Weis…
…
continue reading