Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Monday - Friday, 6-9 a.m.
Host Tom Temin brings you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews below.
Pentagon takes aim at China cyber threat
Friday - 8/20/2010, 8:30am EDT
- Defense officials have long suspected the Chinese military uses civilian computer experts to carry out cyber attacks on American companies and federal agencies. Now, for the first time, the Pentagon is issuing public warnings about the practice. In a new report, DOD brass say they are convinced the People's Liberation Army is using information warfare units to develop virus attacks on enemy computer systems and networks. But the linkage between the Chinese military and civilian hacking experts is difficult to prove. A spokesman tells the AP, the Pentagon will monitor the PLA's buildup of its cyberwarfare capabilities, and continue to develop counter capabilities.
- Federal News Radio told you about two major IT vendors buying information security companies. Intel is purchasing McAfee and Hewlett Packard is buying Fortify. GovInfoSecurity reports that this reflects the narrowing gap between IT and IT security...but that not all companies are able to blend cybersecurity with IT. The reason, they say, is because embedding security in existing products is helpful, but hard to manage. However, they also say you can expect the trend to continue as cybersecurity becomes more top-of-mind for IT companies.
Check out all of Federal News Radio's coverage of cybersecurity issues here.