Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Monday - Friday, 6-9 a.m.
Hosts Tom Temin and Emily Kopp bring you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews below.
NIST to retrain NASA feds as cyber pros
Monday - 9/13/2010, 8:30am EDT
- Job losses from the ending space shuttle program could provide new talent to protect computer networks. The National Institute of Standards and Technology is helping to open a public-private research center that would retrain NASA contractors. It's called the Global Institute for Cybersecurity and Research. NextGov reports the center might qualify for a federal grant designed to minimize the impact of job losses.
- A hacker claiming responsibility for last week's "Here you have" internet worm says the he launched it as a propaganda tool. The fast-spreading e-mail worm crippled some corporate and government networks. Computerworld reports, the worm's author goes by the handle Iraq Resistance. In response to e-mails, he (or she) wrote, "The creation of this is just a tool to reach my voice to people maybe... or maybe other things." The hacker also wrote,"I could smash all those infected but I wouldn't," adding he hoped victims don't think he is a negative person. Although the worm did little damage other than spam, security experts point out it did contain a keylogger for obtaining passwords.
Check out all of Federal News Radio's coverage of cybersecurity issues here.