Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Monday - Friday, 6-9 a.m.
Hosts Tom Temin and Emily Kopp bring you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews below.
Laptop stolen from VA contractor
Friday - 5/14/2010, 8:30am EDT
- A laptop stolen from a Veterans Affairs Department contract worker was not encrypted, as required by department rules. In a letter to VA Secretary Eric Shinseki, one lawmaker wants to know why. Congressman Steve Buyer of Indiana also called on Shinseki to come up with a plan within 30 days to eliminate unencrypted computers carried by contractors. Buyer is the top-ranked Republican on the Veterans Affairs Committee. The laptop was stolen in April from the worker's car, and it contained personally identifiable information on 644 veterans, including medical records, NextGov reports. The encryption rule was initiated after a 2006 laptop theft that contained health information on millions of veterans and their spouses.
- Facebook is taking new steps to protect its millions of users against Internet criminals. The social networking site now will let you be notified about possible signs that someone is trying to tamper with your pages. For example, you can be alerted if someone tries to access your account from a computer or mobile device you haven't used before. Such alerts can be sent by e-mail or by text message. Facebook will also throw up roadblocks when it notices unusual activity - like more than one log-in attempt from different parts of the world. And users will also be able to check where the latest log-ins have come from. Some of these changes are already available, while others are still being tested and will launch over the next few weeks.
- A House panel could vote as early as next week to create a permanent national cyber coordinator, and to give that position budget authority. That job is currently filled by Howard Schmidt. The bill is part of a broader attempt to overhaul federal cybersecurity. It would also cement into law the federal Chief Technology Officer's position, now filled by Aneesh Chopra. NextGov reports the committee hopes to send it to the full House by Memorial Day.