Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Monday - Friday, 6-9 a.m.
Hosts Tom Temin and Emily Kopp bring you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews below.
Vacation cybersecurity advice
Tuesday - 7/6/2010, 8:30am EDT
- You know what security measures to take when you travel, but some social networks and applications might make it harder for you to stay safe while on the road, if you're not careful. PandaLabs advises users to think before you post where you are and how long you'll be gone. NetSecurity.org says before you go on vacation, you should back up your computer information. Don't connect to unprotected WiFi networks. Don't use a computer other than your own, if you can avoid it. If you have to, make sure you change all your passwords as soon as possible, then delete all temporary files, the browser history, cookies, and any other information that may have been saved on the computer.
- When it comes to cloud computing, federal agencies have a lot of work to do on the security front. According to a new report from the Government Accountability Office, federal cloud security lacks both policy guidance and a common way to assess whether commercial cloud providers meet security standards. The report specifically calls out three agencies leading the cloud effort. GAO says the Office of Management and Budget has yet to finish its cloud computing strategy. The General Services Administration runs into trouble with its cloud procurement because of security concerns. And the National Institute of Standards and Technology, while working hard, still has yet to issue comprehensive cloud security guidance.
- There's some trouble for a plan to move thousands of contractors to Fort Meade. That military base having trouble wrapping up a final master lease to build a large office complex that will eventually house some contractors. Fort Meade chose developer Trammell Crow to develop two 160 acre plots in 2006. But a federal project officer cited in the Washington Post says crafting a final agreement has been challenging. The project is part of the Base Realignment and Closure process. Fort Meade will become the new home for the Defense Information Systems Agency and the U.S. Cyber Command.
Check out all of Federal News Radio's coverage of cybersecurity issues here.