Today’s guest is Haywood Talcove, CEO Lexis Nexis Special Services. He talks about Identification on an Enterprise Network. They have found that identification on an enterprise network can improve security. The interview talks about waste, fraud, and abuse from a new perspective: making sure you get what you deserve.
Most listeners may have used the services of Lexis Nexis in college for a research paper. They collect data on a wide range of topics. Lexis Nexis Special Services was cut away from the primary company to focus on addressing issues with the federal government.[Read more…] about How to Solve the Problem of Identification on an Enterprise Network
Today’s interview is with Bill Connor, CEO of SonicWall. He has an award-winning executive and has experience as a White House cybersecurity advisor. One of the surprises of the interview is when Bill reveals that the venerable PDF has been cracked.[Read more…] about PDF gets Cracked
Scott Smith, Managing Director of Sila Solutions Group, visits Federal Tech Talk to discuss aspects of Identity Governance and Administration as well as Privileged Access Management.
Cybersecurity has changed. Today, we see porous networks and Virtual Private Networks (VPNs) securely connecting to compromised networks. If the malicious actors are inside the firewall, then how can administrators control their activity.?[Read more…] about How to Strengthen Identity Management
Today we have Steve Orrin, Federal CTO at Intel Corporation in the studio. The discussion starts with the assumption that the security stack sits on hardware, then moves on to concepts like artificial intelligence and the DoD.
His logic about hardware should resonate with federal information technology professionals. For example, if you are making a transition to the cloud and you have a stack of tools to control access, this grouping of tools will have to sit on a server that has a hardware processor as the foundation. If the code behind the chip is compromised, then anything that sits on it will be compromised as well.
Secondly, edge computing is putting more emphasis on remote servers. If analysis and permission will be discerned by a group of tools sitting a remote server, then the risk is transferred to other hardware as well.
During the interview, Steve reviews the five concepts that the DoD has used to guide its strategy with the emphasis on use cases, scaling, as well as ethics.
Intel has positioned itself at the center of the discussion of applied artificial intelligence. Steve reinforces the idea that AI isn’t a “one size fits all.” The end user should ask questions like is your hardware platform at the edge? Is your application in a low power environment? Do you collect data and then aggregate to the cloud?
Visualization means getting the right information to the decision maker. It means building in the infrastructure to enable you go get the correct information. What data was used to train that system?