Jim Wiggins, executive director at the Federal IT Security Institute joins host John Gilroy on this week's Federal Tech Talk to discuss the steps federal agencies can take to get up to date on their cybersecurity training.
Dcodes' Megan Metzger and Nate Ashton talk about how their company is helping federal IT officials adjust to innovative products offered today.
Emily Miller, director of National Security and Critical Infrastructure Programs at Mocana, joins host John Gilroy on this week's Federal Tech Talk to discuss IoT security and why device security and supply chain management are especially important in the federal government.
What is user identification and why is it better than having to rely on failed usernames and passwords? Find out when Haywood Talcove, CEO of Lexis Nexis Risk Solutions, joins host John Gilroy on this week's Federal Tech Talk.
The fifth generation of mobile technology, 5G, promises federal agencies faster speed for data transmissions, lower latency for better performance, and greater connectivity with more devices.
Benji Hutchinson, vice president of federal operations at NEC, recently joined Federal News Network to discuss best practices for facial recognition implementation, as well as working through any challenges. Learn more on Federal Monthly Insights — Biometrics/Facial Recognition
Bill Conner, CEO of SonicWall joins host John Gilroy on this week's Federal Tech Talk to discuss enterprise cybersecurity and how his company can help federal agencies stop advanced malware attacks.
Steve Orrin, Federal CTO at Intel Corporation, joins host John Gilroy on this week's Federal Tech Talk to discuss artificial intelligence and the five concepts that the DoD is using to guide its strategy.
John Jeremiah, enterprise DevOps evangelist and product marketing leader at GitLab, joined Federal News Network to discuss how agencies can benefit from a rapid application development mindset.
Rick Lober, vice president and general manager of the Defense and Intelligence Systems Division at Hughes Networks, joins host John Gilroy on this week's to discuss the challenges that federal IT officials are having in managing the massive amounts of date generated by satellites.
Pegasystems offers low-code and no-code solutions, providing organizations with developer tools to design systems and applications without having to write the code themselves. Organizations can apply automation to increase productivity, using visual tools to build software, allowing business and IT to collaborate in the process.
By minimizing access to applications based on requirements of the specific user, Zero Trust security removes the need to rely on the traditional boundaries of a network perimeter.
Attivo Networks CTO Tony Cole joins host John Gilroy on this week's Federal Tech Talk to discuss how "engagement-based attack analysis" can help federal agencies prevent cyber threats from malicious actors already inside their networks.
The Department of Homeland Security has worked with Congress to implement Continuous Diagnostic and Mitigation programs, commonly known as CDM. One variation on that approach is from the Defense Department with a concept of the Comply to Connect program, or C2C. Much confusion has ensued trying to understand the differences and applications of both concepts.
Kara Sprague, senior vice president and general manager of Application Services at F5 Networks, joins host John Gilroy on this week's Federal Tech Talk to discuss app security and how her company is using new technologies to help federal IT professionals protect and optimize modern container based applications.