Tony Cole, the CTO at Attivo Networks, explains how agencies can stop being one-step behind the cyber attackers.
In a two-part series, host Sean Kelley discusses with experts from the election community key lessons learned from 2016.
A sloppy cyber risk assessment can lead to misallocation of resources, false positives and an unrealistic sense of security at federal agencies, says Larry Clinton of the Internet Security Alliance.
A new High Risk series report from the Government Accountability Office took the federal government to task over its lack of action on cybersecurity issues, but House lawmakers passed a few bills that aimed at improving the situation.
For this month’s show, Cyber Chat’s host Sean Kelley sat down with a reflective Scott Blackburn. Blackburn served in many capacities while at the Veterans Affairs Department.
Amanda Sparks, a writer and researcher, offers six tips to keep federal employees and their data safe from cyber attacks.
Securing vehicle software updates, telephone network attacks at 911 centers and mobile app vulnerability are among the agency's research projects underway.
Stew Magnuson, editor-in-chief of National Defense Magazine, joins host Derrick Dortch on this week's Fed Access to discuss artificial intelligence, army robotics, hypersonic missiles and other advances in military technology.
What is Instrumented Security and how can it help prevent cyber attacks at your federal agency? Find out when Earl Matthews, senior vice president and chief strategy officer at Verodin Inc., joins host John Gilroy on this week's Federal Tech Talk. April 3, 2018
Ross Rustici, director of intelligence services at Cybereason, sees to end in sight to cyber attacks from the secretive nation.
Tom Ruff, vice president of Public Sector America's at Akamai Technologies joins host John Gilroy on this week's Federal Tech Talk to discuss how his company can help federal agencies prevent cyber attacks. March 13 2018
Heather Kuldell, managing editor at Nextgov, joins host Derrick Dortch on this week's Fed Access to talk about the U.S. Cyber Command, and what a change in leadership this year will mean for the organization.
Cyber attacks travel at the speed of light and nothing the military has can keep up, least of all the acquisition process.
Who is actually responsible for that cyber attack that hit your organization? Often it comes down to guess work. Few people have much faith in the accuracy of the attribution. So what to do? John Davis II, senior information scientist at the Rand Corporation and co-director for scalable computing and analysis, joined Federal Drive with Tom Temin with recommendations.