Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
It seems like the whole world is going mobile, and that includes the federal government. Agencies are using more and more apps for collaboration and productivity. But some apps increase the potential for exposing government data. To help you guard against these security risks, the National Institute of Standards and Technology is providing tips to the federal community for vetting third-party apps. Computer Scientist, Tom Karygiannis, joined Tom Temin on the Federal Drive to discuss the guidelines.
The National Institute of Standards and Technology kicks off the Global City Teams Challenge in September. Tech-savvy members from the federal government and private sector will come together to address issues including air quality, traffic management and emergency services coordination, all through the use of smart technology. Sokwoo Rhee, associate director for Internet of Things and Cyber-Physical Systems at NIST, joined Tom Temin on the Federal Drive to discuss what the agency hopes to accomplish.
A savings of $2 million per year is now being realized at the U.S. Mint after an innovative engineer stepped out of the box and asked a friend at another federal agency for help. In part three of our special report, Rainmakers and Money Savers, Federal News Radio takes you inside the lab where a group of engineers and nanotribologists combined their expertise to solve a coin-making problem and, in turn, saved a lot of cash.
The National Information Assurance Partnership, the U.S. implementation of what was supposed to be a faster, cheaper process to verify the cybersecurity of commercial IT products, turned out to be so slow and expensive that few companies could afford to go through it. But officials said they hope a recent overhaul in the procedures will breathe new life into the program.
It keeps getting easier to manufacture a counterfeit computer chip. Experts say federal information systems increasingly are at risk because of flaws in their supply chains. It is not just a question of fake parts. Genuine ones that have been tampered with, or are just poorly made, can cause damage. The National Institute of Standards and Technology is revising guidelines for agencies to help them secure their supply chains. Jon Boyens is an IT specialist in the security outreach and integration group at NIST. He spoke with Emily Kopp on the Federal Drive.
The National Institute of Standards and Technology gives agencies guidance for continuing the transition to a real-time, dynamic cybersecurity.
The National Institute of Standards and Technology has launched a four-part plan to help agencies build more secure IT systems. NIST Computer Scientist Ron Ross, who guided a new publication on the issue, tells the Federal Drive with Tom Temin and Emily Kopp that the same engineering principles that apply to bridges and buildings should apply to IT. That is, security should be built in, not added later.
A new report from the Big Data and Privacy Working Group makes six-actionable policy recommendations for how the White House can address privacy concerns raised by big data technology.
Homes and buildings aren't built the way they used to be, and when they catch fire, they don't burn the same way either. Newer buildings have more open floor plans and much more use of plastics and synthetic materials. Now the National Institute of Standards and Technology and the Underwriters Laboratory have teamed up to educate firefighters on the modern fire. The course is based on a series of controlled burn experiments, performed with the help of the New York City Fire Department. Daniel Madrzykowski, a fire protection engineer and leader of the Fire Fighting Technology Group at NIST, told Federal Drive hosts Tom Temin and Emily Kopp what firefighters learn through the course.
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities. GSA and SBA continue their ongoing quarrel over the Office Supplies 3 contract, and April marks the three-year anniversary of NSTIC's release.
Federal officials say they need help from Congress to ensure companies are protected under the law for sharing cyber information with the government. Officials also say building up the cyber workforce is a top concern.
As agencies strive to make legacy applications available on any device, NIST is providing help by developing metrics and focusing on portability.
The National Institute of Standards and Technology brought agency and industry experts to its Gaithersburg headquarters to discuss cloud computing this week. Federal News Radio's Lauren Larson was there. She spoke with NIST Cloud Technical Program Manager Robert Bohn about the key word of the event — interoperability. Read Lauren's related story.
Maryland officials have signed an agreement with the National Institute of Standards and Technology to more clearly define the development of the National Cybersecurity Center of Excellence in the state.
The White House will release an updated list of agency high-priority goals and cross-agency priority goals with the annual budget request to Congress in March. Meanwhile, the Office of Management and Budget detailed agency successes over the last two years in meeting current goals.
The Senate confirmed Sloan Gibson to be the next deputy secretary of the Department of Veterans Affairs. The director of the National Institute of Standards and Technology, Patrick Gallagher, is heading off to academia.
NIST led the year-long effort to develop the Framework for Improving Critical Infrastructure Cybersecurity. Agencies now must review regulations to ensure alignment with the framework. DHS also launches a new voluntary program that will offer access to a variety of federal resources to help companies improve cybersecurity.
The goal is to more accurately evaluate the security of the government's computer networks and systems. These efforts could bring more consistency to the cyber auditing process and engender more confidence in its results.
Former federal CISO Pat Howard offers tips to waterproof your agency's information security continuous monitoring strategy.
Phyllis Schneck, the deputy undersecretary for cybersecurity at DHS, said the department will release a voluntary cyber program on Feb. 14 as part of the deliverables under President Barack Obama's 2013 Executive Order. Schneck said among her top priorities is to continue to build a trust relationship with the assorted public and private sector stakeholders.