Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Monday - Friday, 4-7 p.m.
In Depth with Francis Rose features daily interviews with top government executives and contractors. Listen live from 4 to 7 p.m. or download his archived interviews below.
DHS launches 3-tier cyber strategy
Monday - 3/28/2011, 7:01pm EDT
The idea is based on automation, interoperability and authentication. DHS hopes this 3-tier approach could make networks more secure.
Fierce Government IT reports DHS's new strategy draws heavily on an immune-system analogy saying cybersecurity should become a matter of "automated courses of action" in which devices sense malicious actors and enact defensive responses on their own.
The report also calls for the creation of a "Cyber Center for Disease Control and Prevention," The Cyber CDC would watch for threats and incidents, disseminate data, perform threat analysis, make recommendations and coordinate preventive actions.
This story is part of Federal News Radio's daily Cybersecurity Update brought to you by Tripwire. For more cybersecurity news, click here.