Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. Buying a wireless charger for your smartphone. And we meet the hacker who defeated the infamous WannaCry ransomware.
In this exclusive executive briefing, IT security professionals address the federal approach to identity management and zero trust.
Agencies and private-sector companies invest considerable resources defending themselves against external cyber threats, but insider threats pose just as great a threat to these organizations if they don’t have a strategy in place to defend against them.
What is Military Design Thinking? How is Design being used to transforming military planning process? What is the Joint Special Operations University doing to educate special operations personnel in the use of design thinking? Michael Keegan explored these questions and more with Hal McNair, Director of Continuing Education at the Joint Special Operation University and faculty members Ben Zweibelson and Nate Schwagler.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. What to do when when your hard drive fails. And we meet the designer of the first computer-driven word processor.
There are an increasing amount of hoops contractors working in cyber need to jump through to partner with the government, but Tony Hubbard, government cybersecurity lead at KPMG, says that is the reality of the world today.
This content is sponsored by Melwood During National Disability Employment Awareness Month While workplace diversity is an issue on the minds of every HR professional in the DC region, in today’s tight labor market hiring for…
John DeSimone, the vice president for Cybersecurity and Special Missions at Raytheon, said agencies have to ask themselves, can their data—not just their systems—survive an attack?
Dan Fallon, the senior director of federal engineering for Nutanix, said the way to close many cybersecurity gaps is to adopt the concept of inherent security or secure by original design.
In this exclusive executive briefing, IT specialists discuss how federal agencies are approaching cloud computing.
FEDtalk Tune in to FEDtalk this week for a discussion on Enterprise Risk Management. The federal government is great at responding to problems, but experts across the federal community have ideas on how to make…
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. What to do when someone takes over your Facebook account And we meet the co-founder of the social news website Reddit.
Rick Howard, the chief security officer for Palo Alto Networks, said the wide-spread acceptance of using cloud services for operational requirements is driving opportunity to modernize.
Dana Laake and her special guest Jeffrey M. Smith will discuss why you should eat organic as if your life depends on it. Jeffrey M. Smith is a leading consumer advocate promoting healthier non-GMO choices.…