Federal cybersecurity laws and regulations are continually changing to reflect today’s dynamic cyber threat environment. Federal employees and government contractors alike need to comply with these changes, else face serious consequences. Answer these 5 sample questions to see if your knowledge is up-to-date.
Cancer can put a strain on intimate relationships. Treatments for cancer and the disease itself may cause changes in sexual desire and function.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. Buying a wireless charger for your phone. And meet a computer scientist who was instrumental in creating the design for today’s mobile phone.
Dana Laake and her special guest Dr. Paul O’Malley will discuss biomimetic dentistry including the science of rebuilding teeth safely without destroying them.
Craig Harber, the chief technology officer for Fidelis Cybersecurity, said there are several steps agencies can take to reduce their risks, starting by consolidating their security tools and architectures.
FireEye has an internal-facing insider threat program, where they fine-tune techniques for preventing insider threat breaches.
Like many large agencies, Justice officials want to use the disparate data sources to better analyze trends, improve internal operations and efficiency, and offer better services to Justice’s constituencies.
The United States has a long list of threats that it’s trying to get its arms around. But John Cotton, executive MBA adjunct faculty for the School of Business at George Mason University and retired Navy vice admiral, says there is one threat that outweighs all of them.
What are the IT strategic priorities for DHS? How is it working to modernize its IT infrastructure? What is DHS doing to improve its network connectivity and resilience while maturing its cybersecurity posture? I explored these questions and more with Dr. John Zangardi who joined me and my cohost Don Fenhagen, IBM, from the SPADE conference for an insightful and in-depth discussion.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. As tensions in relations. rise, the Iranians are increasing their hacking attacks on U.S. targets. And we meet the mathematician and entrepreneur who co-founded Akamai Technologies.
Dana Laake and her special guest Dr. Elizabeth Plourde will discuss why hormones are essential for lifelong vibrant health.
Over the past few years, facial recognition technology (FRT) has improved in leaps and bounds.
To be a successful Contracting Officer (CO), you must have the skills to quickly acquire quality products, services, and solutions at a best-value price.
More than 15 million adults are living with cancer in the United States today. For each patient, a caregiver is sharing in the cancer journey.
The evolution of cyber tools and capabilities over the last few years, most notably the sharing of threat intelligence, has enabled agencies to do more to get ahead of the cyber threats.