• Caring Village CEO and Co-Founder Mike Behrmann, and Jennifer Taylor, executive vice president of Sales and Marketing, join host John Gilroy to discuss applied technology and how it can help federal IT professionals. November 22, 2016

    November 21, 2016
  • F5 Networks' Lou Giglio, Jeff Deal, and Ron Cochran join host John Gilroy on this week's Federal Tech Talk to discuss encryption and it's role in consumer security. September 13, 2016

    September 12, 2016
  • Blue Coat Systems Federal CTO Aubrey Merchant joins host John Gilroy to discuss Cloud Access Security, network visibility, and lifecycle security. July 19, 2016

    July 18, 2016
  • “We encrypt almost everything,” Frank Konieczny, chief technology officer of the U.S. Air Force, said on Federal News Radio’s In Focus. “Probably close to 100 percent, if not 100 percent, within the Air Force domain right now, because you have to. Now the question becomes, when do you decrypt to look at everything else? And we do it at the application level or at the endpoint level, user endpoint level, so we don’t like decrypting in the middle because that just adds another factor or problem area for incident reporting.”

    May 27, 2016
  • Wayne Lewandowski, vice president, US Federal Sales, Vormetric, joins host John Gilroy to discuss his company's 2016 Data Threat Report, data encryption, and managing security in the federal government. March 29, 2016

    March 28, 2016
  • The OPM cyber attack may turn out to have a silver lining. The attack may give agencies an opportunity — if they choose to take it — to redefine encryption. Chuck Archer is the executive chairman at Covata and former assistant director of the Federal Bureau of Investigation. He tells In Depth with Francis Rose that encryption isn't a people problem.

    July 15, 2015
  • Department says 99 percent of laptops now are encrypted. Of the 21 laptops reported stolen or missing in the last two months, all were secured with security software.

    August 03, 2012
  • The FBI's Criminal Justice Information Services says local law enforcement needs to encrypt its data if it wants to join the cloud. The FBI said when information is encrypted from the start, police can have control of its cybersecurity on any cloud system, according to a post on InfoSecurity.

    April 05, 2012
  • Host John Gilroy is joined by John Bordwine, public sector CTO at Symantec. They will discuss \"Endpoint\" security and how it applies to mobile technology. June 7, 2011

    June 07, 2011
  • Despite a 2006 mandate to secure mobile devices and implement two-factor authentication, only just over half of federal agencies have managed to do so. OMB submits its annual FISMA report to Congress detailing the steps the government has taken to improve cybersecurity, including spending $12 billion on cybersecurity last year.

    March 21, 2011