GovTech 공개
[search 0]
Download the App!
show episodes
 
Artwork

1
govtech.com Security News Podcast

Ira Victor with Samantha Stone

Unsubscribe
Unsubscribe
매달
 
Security News Podcast features information security specialist Ira Victor and award-winning journalist Samantha Stone in a fast-paced news program about data security, the law, and the digital underworld. Your security depends on these weekly updates, with topics spanning data confidentiality, disaster recovery, encryption, open source and more.
  continue reading
 
A show that takes the two dullest subjects in the world, government and technology, and makes them irresistibly relevant and undeniably fascinating. (Trust us!) From blockchain and civic-tech startups in smart cities to public policy in a world of autonomous vehicles and always-on AI, GOVTECH 360 covers the collision of tech and the future of states and localities. From the award-winning editors at Government Technology.
  continue reading
 
Loading …
show series
 
GovTech Editors Noelle Knell and Ben Miller take listeners through the professional and personal backstories of a handful of honorees of the Class of 2020 - including Rick Smith (Axon), Jordan Davis (Smart Columbus), Yessica Jones (Arkansas), Anne Schwieger (Boston) and Curt Wood (Massachusetts). Read about and see all 25 at govtech.com. Special th…
  continue reading
 
It’s been a little over a month since a ransomware attack took out Baltimore’s IT services and cost millions of dollars to recover from. GovTech reporter Lucas Ropek helps break down what happened, how the city could have responded differently, and the potential advantages and pitfalls of paying a ransom. Then, Paul talks to the founder of Good2Go,…
  continue reading
 
What’s the most common name of state CIOs? How many men and women have held the job? And is it true that CIO could also stand for Career Is Over? Tune in for our data-driven look at more than 200 state tech chiefs. Those who aspire to become a state chief information officer might consider changing their name to Jim. And it wouldn’t hurt if they br…
  continue reading
 
On a GovTech360 Rapid Round from the Market Navigator Studios, , we begin in Colorado where the state has named a dedicated blockchain architect to bolster its cybersecurity stance and guide it into the future. From there, amid all the 5G excitements, we look up to near space earth orbit for the future of broadband. And if your agency is using AI v…
  continue reading
 
The debut episode of GovTech360 features two GT Doers, Dreamers and Drivers.From the Market Navigator Studios, we talk to Nebraska Chief Information Officer Ed Toner and Seattle Chief Privacy Officer Ginger Armbruster about their award-winning work. Show Notes: - Growing your own Agile development team of millennials who code @ 1:58. - Organic Agil…
  continue reading
 
eDiscovery Strategies NeededMontgomeryWard waits six months to alert 51,000 customers of credit card data breachMore on the changes in mandates to protect credit card security in PCI rule 6.6, plus tips on more secure web surfing Podcast sponsored by DeviceLock and Emergency Management Magazine.저자 Ira Victor with Samantha Stone
  continue reading
 
E-Vote: Voting Machine Industry Says Federal Regulatory Process BrokenFinjan Discovers more than 500 Mb of Stolen Medical, Business and Airline Data on Crimeware Servers in Argentina and MalaysiaChanges in section 6.6 of the PCI credit card security standardPodcast sponsored by DeviceLock and Emergency Management Magazine.…
  continue reading
 
SANS warns of potentially harmful Iowa storm video scamsUsing out-of-the-box thinking to secure the wireless network for Wisconsin police departmentsUsing reCAPTCHA to fight spam bots and help librariesPodcast sponsored by DeviceLock and Emergency Management Magazine.저자 Ira Victor with Samantha Stone
  continue reading
 
Ransomware hold data hostage with strong 1024-bit keyNew report show spike in attacks hidden in innocent-looking internet trafficSecurity policy guidelines from GFIRST Security Conference 08, OrlandoPodcast sponsored by DeviceLock and Emergency Management Magazine.저자 Ira Victor with Samantha Stone
  continue reading
 
Scammers and spammers inundating Craigslist?"Hacking" through the printers? We ask an expert from HP.Study sheds light on the eDiscovery challenges organizations face. We interview a security researcher that worked on the study.Plus this week's news on data security, the law, and the digital underworld.Podcast sponsored by DeviceLock and Emergency …
  continue reading
 
This week's news on data security, the law, and the digital underworld.Over 500,000 open source-driven web sites could be infecting visitors with malicious attacks. We interview Jamz Yaneza, Threat Research Manager with Trend Micro, Inc.Have spammers figured out a new way to use popular email services to send out more waves of spam? We talk with Ma…
  continue reading
 
Millions of emails missing from the White House, and the explanation is not necessarily political. What's a mash-up? A great way to offer lots of information in one place. David Bolker, cofounder of the OpenAjax Alliance, and CTO of IBM Emerging Internet Technologies explains how mash-ups challenge security. Public eRecords integrity with Anne Weis…
  continue reading
 
Loading …

빠른 참조 가이드