Emily Miller, director of National Security and Critical Infrastructure Programs at Mocana, joins host John Gilroy on this week’s Federal Tech Talk to discuss IoT security and why device security and supply chain management are especially important in the federal government.
These episodes occur regularly, but it’s always hard to watch.
A look at the events shaping cybersecurity policy in the federal government over the past six years.
The mysterious Gauss cyber-surveillance malware has experts stumped. Kaspersky Lab, a Moscow-based security vendor, has been dissecting Gauss.
T.K. Keaninni, chief technology officer for nCircle joins host John Gilroy to talk about how his company can help your agency with its network security issues. June 26, 2012
House Intelligence Committee Chairman Mike Rogers said he’d be “very careful” about assigning blame for the attacks on Iran’s nuclear program. Half of what’s been reported in the media on the matter is untrue, he said.
On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources. Across-the-board mandatory cuts have a lot of people on edge, especially those who work closely with the Defense Department. Across-the-board mandatory cuts have a lot of people on edge. But some of the rhetoric could be overblown, says Benjamin Friedman, a research fellow in defense and homeland security studies at the Cato Institute.
On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.
The New York Times reports the efforts, code name “Olympic Games”, began during the Bush administration and one of the strings of code that accidentally became public became known as Stuxnet.
The Duqu virus, widely known as a “twin” to the Stuxnet worm that targeted Iran’s nuclear infrastructure, is evolving yet again. Software security firm Symantec said the program has a new variant altered “just enough…to evade some security product detections.”