Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Federal News Radio Archives
Comptroller General Gene Dodaro discusses government management and projects on the high-risk list.
Ron Sanders, formerly with the intelligence community, explains the challenges to telework and how to overcome them.
The study by ISC(2) found there's a severe gap in the skills needed for cybersecurity professionals.
RSA Security Conference in San Francisco debates the possibility of warfare moving in to the cyber realm.
Josh Stephens, vice president of Technology and Head Geek for Solar Winds, told the DorobekINSIDER that agencies' tech shops need to embrace the change - not avoid it.
Joint Chiefs Chairman Admiral Mike Mullen is asking for your questions and concerns about the Pentagon.
These are the stories Federal News Radio reporters are working on today.
Laura Bailyn, the new senior director health initiatives at the Markle Foundation, discusses the ways the foundation is trying to improve health IT worldwide.
The poll relates to two amendments in the House that are proposing a freeze on step increases under the General Schedule.
The technology behind the IBM supercomputer Watson beating human contestants on Jeopardy! could drive Gov 2.0 initiatives and help agencies deliver services more efficiently.
Budget expert Stephen Ryan explains the likelihood of a government shutdown as budget talks continue.
The National Strategy for Trusted Identities in Cyberspace has come under fire due to the possible government overreach and added bureaucracy.
CNN's Brian Todd discusses how protests have emerged in the Arab world.
Bob Childs, chancellor at the National Defense University's iCollege, describes the new program.
The CD book disk with a secure operating system can convert a spyware-laden PC into a secure government machine.
The top stories reporters are working on today.
The groups have launched a website, asking for public input in an effort to improve the acquisitions process between government and industry.