Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Dell's George Newstrom and Jeff Lush join host John Gilroy to discuss security and the federal cloud.
August 20, 2013
The space agency releases the solicitation for the next version of the $10 billion IT hardware and services contract. Proposals are due in about eight weeks.
Phyllis Schneck is the new deputy undersecretary of cybersecurity in the National Protection and Programs Directorate at DHS. She replaces Mark Weatherford, who left in April.
Inside the Reporter's Notebook: A new job for a former VA senior official; Countdown to cloud credential pilot begins
News and buzz in the acquisition and IT communities that you may have missed this week.
New investors could restore BlackBerry's place in the federal market, as the company weighs its options for the future.
The Energy Department confirmed 14,000 current and former employees are at risk of identity theft as cyber attackers gained access to their personal information. This is at least the second hacking incident this year.
Sasi Pillay, NASA's chief technology officer, said the IT Labs program wants rapid, low-cost, low-risk projects to improve the space agency's use of technology. NASA is in its third year of the effort, which has produced several potential breakthroughs, including one for RFID and a secure computing environment.
Gary Washington, the chief information officer of the Animal and Plant Health Inspection Service, said having a better understanding of its portfolio will ease the transition to new technologies.
August 15, 2013
Army Private Bradley Manning apologizes for giving classified documents to WikiLeaks. His sentencing hearing is raising questions about Army commanders' ability to spot mental health issues.
The director of the Defense Information Systems Agency says the agency will spend the next year focusing on a faster, more agile acquisition process to accelerate the way it delivers technology, rather than letting procurements drag on for years.
The Justice Department's EOIR recently launched its new eRegistry system for attorneys who do work before the immigration courts. The system is one step toward making the office's business processes all electronic. It also will make it harder for notarios, or unqualified people who represent immigrants before the court system, to bilk unsuspecting immigrants.
Todd Sanders, senior partner and Enterprise Data architect at ITOTS Networks, LLC, joins host John Gilroy to discuss a wide range of technology issues.
August 13, 2013
As recently as a decade ago, enterprise services was seen as a way to cut costs and provide more efficient data and telephone services to civilian offices. But now, with the rise of the Pentagon's Joint Information Environment, enterprise services is taking on a new role in providing tactical information advantage to warfighters in the field, and business opportunities to industry capable of providing both the hardware and software to make it happen.
Joining us to talk about it on this edition of "AFCEA Answers" is David DeVries, Deputy Chief Information Officer for Information Enterprise, Department of Defense.
Researchers at mobile security firm Lookout discovered a security flaw in Google Glass which allowed them to capture data without the user's knowledge, when the user merely took a photo that captured a malicious QR code. Lookout was able to force Google Glass to silently connect to a Wi-Fi access point, which let the researchers view all of the data flowing to and from the device. When combined with an Android 4.0.4 web vulnerability, the hack apparently gave researchers full control of the Glass headset.
DHS awards 17 vendors a spot on the continuous diagnostics and mitigation contract. Agencies can now access a common set of tools and services to improve how they monitor and secure their computer networks.
The Defense Information Systems Agency will issue several contracts under a unified capabilities initiative to move virtually all of DoD's communications onto Internet Protocol-based networks, and to better integrate voice, video and data services.
The FRTIB awarded Science Applications International Corporation (SAIC) a five-year, $224.5 million contract. SAIC beat out several competitors including incumbent Serco.
Defense Department's decision to centralize management of mobile technology is borne out of painful lessons from regular old wired IT networks. Budget pressure, officials say, makes it easier to sell the concept of doing things once and sharing the results.
Dave Bennett, the DISA chief information officer, is reducing the number of classified and unclassified networks to reduce costs and improve capabilities. At the same time, he's ready to expand the use of wireless capabilities across Fort Meade, Md.
August 8, 2013
Building off a project to assess the nation's overall cyber capabilities, the Department of Homeland Security has begun drawing up plans for how it would respond in the event of a range of cyber emergencies affecting critical infrastructure.