Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Horace Blackman, CIO and director of IT support services at the Veterans Affairs Department Central Office talks about how mobile devices are handled at his agency.
September 4, 2012
McAfee says Android devices are the most vulnerable. Twitter has become one of the major threat vectors.
Agencies have taken the first steps in building a more digital-friendly government. As part of the far-reaching digital services strategy released in May, most large federal agencies have identified services and resources that could benefit from a digital overhaul.
Agencies considering allowing employees to use their own smartphones and other mobile devices on the job - known as bring-your-own-device (BYOD) - have a new toolkit at their disposal to ease the transition. The toolkit contains key considerations for agency IT managers, success stories from agencies that have already implemented such programs as well as sample existing policies at those agencies to serve as samples.
This week the Army exceeded 500,000 users on its enterprise email network. The migration of potentially 3.7 million users to the network should be completed by March 2013. The Defense Department's move to a single, cloud-based system run by the Defense Information Systems Agency sets the stage for other enterprise-wide systems, said John Hale, DISA's chief of enterprise applications, in an interview with Federal News Radio's Jared Serbu and Jason Miller.
Since March 2010, the device has helped to catch 450 drug traffickers, weapons smugglers and potential terror suspects. The developers of the technology are finalists for the 2012 Service to America Medal.
Michael Isman, vice president of Booz Allen Hamilton, says agencies adopting a bring-your-own- device strategy should do so as part of their larger digital strategy.
F-Secure analyzed 19 new families of mobile malware. It found a big increase in products that target Android.
New mobile application helps military personnel and veterans undergoing post-traumatic stress disorder treatment to relieve stress and work through traumatic memories.
The agency spends thousands of dollars per user on computers for contractors and task force officers. ATF's chief information officer said those individuals could easily use their own devices to access virtual desktops that provide the same functionality.
New guidelines could help agencies adopting bring-your-own-device strategies manage the potential risks smartphones and tablets could pose.
The FBI wants an automated testing system that can handle all Android applications. Researchers are trying to standardize a technique called fuzzing that forces outside data into the apps to find weaknesses.
Christopher Fountain, senior vice president of SecureInfo joins host John Gilroy to talk about IT security.
July 10, 2012
The agency will hold a workshop July 25 to review the second draft of FIPS 201-2.
Early-adopter agencies of the bring-your-own-device idea are blazing their own trail through the security, privacy and policy challenges of personally-owned devices on government networks.
Ted Davis, president of Unisys Federal Systems, will talk about how his company can help your transition to the cloud.
July 3, 2012
While government IT resources are shrinking, a dire need for improvements with customer interaction will be key to agencies survival.
Al Fox, federal division head of Outsystems, spoke with In Depth with Francis Rose on Industry Chatter .
The U.S. Agency for International Development saw
their FISMA scores drop to an F grade. Jerry
Horton, USAID's chief information officer, said
they will fix their shortcomings this year.
June 21, 2012
NIST, DHS experts say protecting smartphones and tablets shouldn't be any different than securing typical desktop or laptop computers. DHS will release mobile security reference architecture to help agencies understand common concepts. NIST is updating security control guide with 250 new requirements, including mobile controls.