Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
A proposed rule would make contractors responsible for securing networks that store any type of government information. It defines key terms like information and "information system."
Marine Lt. Gen Richard Mills told an audience at a conference in Baltimore last that he led cyber attacks in Afghanistan.
The plan calls for the creation of two new bodies. The Cyber Investment Management Board would oversee cyber acquisition, and a Cyber Capabilities Team would look at technology and policy requirements.
Maj. Gen. John Davis moves up from the position of director of current operations at the Cyber Command.
Military's cyber offense and defense strategies are being executed by two separate teams that can't sufficiently share knowledge, per the commander of U.S. Cyber Command
The fixes plug vulnerabilities in Flash Player. If left untreated, they could cause a system crash or allow attackers to take control of a computer.
If the claims are true, it means hackers could spy on network traffic, obtain credentials to get on the inside and attack the power plants.
The research agency DARPA is hosting a daylong event Sept. 27 on its upcoming "Plan X" that focuses on building solid attack strategies and tools.
The department is trying to figure out the best way to manage the cards of contract employees after they leave the department. Every agency using a managed service provider for secure identity card issuance faces a similar challenge. Commerce also is working on integrating physical and logical access systems.
Sources say the Defense Department is behind on implementing the new plan and may in fact be exploring other options.
The Army chief information officer said the military service was well on its way to completely migrating to the cloud-based email by March.
The military, working through DARPA, is trying to develop its own marketplace of apps for helping troops in the field.
They say hackers who want to steal cars or just eavesdrop on conversations may have an easy time of it.
ikileaks founder Julian Assange portrayed himself Sunday as a victim of an American "witch hunt."
OMB issued fiscal 2014 technology project guidance detailing the steps agencies should take to reduce spending across six areas. Agencies also must tell OMB how it would reinvest the savings into new or innovative projects.
The command hopes to attract cyber pros with special incentives, including bonuses and education benefits.
A Google spokesman said he company plans to enhance it apps with functions already offered by Postini, an email security company owned by Google.
The National Institute of Standards and Technology is working on updating guidelines for Transport Layer Security. That technology prevents anyone from eavesdropping on Internet communications.
The Defense Department's goal is to enhance training and cyber situational awareness.
The mysterious Gauss cyber-surveillance malware has experts stumped. Kaspersky Lab, a Moscow-based security vendor, has been dissecting Gauss.