Sign up for the Government Matters Daily Program Guide
Data Deep Dive
Get To Know
Innovation That Works
Tech Leadership Series
The Federal Beat
The Pentagon Beat
The Department of Energy establishes CESER office
Brig. Gen. Gregory Touhill (USAF, ret.), President of Cyxtera Federal Group, discusses the Department of Energy’s new security and emergency...
DHS releases cybersecurity strategy
Ari Schwartz, managing director of cybersecurity services at Venable, discusses the new Department of Homeland Security cyber outline and the...
Lawmakers look to save White House cyber coordinator role
Tony Cole, chief technology officer at Attivo Networks, discusses congressional efforts to save the position of White House Cybersecurity Coordinator...
Status of DHS’s Continuous Diagnostics & Mitigation program
Kevin Cox, CDM program manager at the Department of Homeland Security, details how the data collected by the initiative will...
Evolution towards managed security services in government
Robert Bigman, Former CISO at CIA and founder of 2BSecure, discusses the outlook for managed security at federal agencies, and...
Examining the approval process for government-backed cyberattacks
Chris Bing, associate editor at CyberScoop, discusses how members of the National Security Council are looking to change the way...
Report: 1 in 50 govt. contractors are properly securing email
Bob Gourley, former Defense Intelligence Agency CTO and publisher of CTOvision, discusses the failure of government IT contractors to incorporate...
Civilian vs. military approach to identity & access management
Brig. Gen. Gregory Touhill (USAF Ret.), former federal chief information security officer and president at Cyxtera Federal Group, discusses problems...
“Hack Your State Dept” bill to run agency bug bounties
Ari Schwartz, managing director of cybersecurity services at Venable, discusses a bill in Congress that would make the State Department...
Challenges in government cyber risk mitigation
George DeLisle, federal sales director at Varonis, discusses the White House’s planned action on cybersecurity, and how industry is interested...
CLOUD Act passes in omnibus spending bill
FCW Staff Writer Derek Johnson and Joseph Marks, Cybersecurity Correspondent at Nextgov, discuss the latest cybersecurity stories out of Congress,...
GAO: Border security progress & challenges
Rebecca Gambler, Director of Homeland Security and Justice Issues at the Government Accountability Office discusses her testimony on the Department...
DHS announces new research and technology guides
Douglas Maughan, director of the Cyber Security Division at the DHS Science and Technology Directorate, discusses guides that his agency...
Top priorities for new NSA & Cyber Command leadership
Retired Rear Admiral Bill Leigher, director of DoD Cyber Programs at Raytheon, talks with Colby Hochmuth about the upcoming change...
DHS warns Russian cyberattacks are increasing
Ron Marks, chair of the Intelligence Program at the Daniel Morgan Graduate School of National Security, sits down with Francis...
Common themes in agency cyber risk mitigation
Jeanette Manfra, Assistant Secretary of the Office of Cybersecurity & Communications at the Department of Homeland Security, discusses how agencies...
Cyberactivity consequences for the Defense Industrial Base
While the world’s eyes are on North Korea’s nuclear ambitions, their cyber program has been wreaking havoc. Last year, North...
Operational security vs. network security in the military
As Deputy Secretary of Defense Patrick Shanahan is pushing for increased security in contractor networks, a new question is being...
Agencies get innovative to recruit cyber talent
Federal Chief Information Officers are always looking to expand their teams by hiring the best cybersecurity talent. However, finding this...
TSP scores low on information security audit
The Federal Retirement Thrift Investment Board’s security policies might need improvement. An audit performed by consulting firm Williams Adley gave...
Solving the hacker attribution problem
Adept hackers are masters of misdirection. When cyberattacks occur, digital breadcrumbs provide evidence of the malicious computer’s origin. However, these...
DoD to set high standard for industry cybersecurity
At West 2018, Deputy Secretary of Defense Patrick Shanahan set an ultimatum for defense contractors: secure your data or lose...
Sec. Mattis considering ban on mobile devices at Pentagon
Brig. Gen. Gregory Touhill, president of Cyxtera Federal Group, discusses the potential prohibition of smart devices that Secretary of Defense...
‘Whitelisting’ reemerges as innovative cyber strategy
Eric Chudow, senior mitigation expert at the National Security Agency, discusses the cybersecurity strategy called “whitelisting,” and why it’s resurging...
© Copyright 2018