Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
- Veterans in Private Sector: Making the Transition
Shows & Panels
Sources say the Defense Department is behind on implementing the new plan and may in fact be exploring other options.
The Army chief information officer said the military service was well on its way to completely migrating to the cloud-based email by March.
The military, working through DARPA, is trying to develop its own marketplace of apps for helping troops in the field.
They say hackers who want to steal cars or just eavesdrop on conversations may have an easy time of it.
ikileaks founder Julian Assange portrayed himself Sunday as a victim of an American "witch hunt."
OMB issued fiscal 2014 technology project guidance detailing the steps agencies should take to reduce spending across six areas. Agencies also must tell OMB how it would reinvest the savings into new or innovative projects.
The command hopes to attract cyber pros with special incentives, including bonuses and education benefits.
A Google spokesman said he company plans to enhance it apps with functions already offered by Postini, an email security company owned by Google.
The National Institute of Standards and Technology is working on updating guidelines for Transport Layer Security. That technology prevents anyone from eavesdropping on Internet communications.
The Defense Department's goal is to enhance training and cyber situational awareness.
The mysterious Gauss cyber-surveillance malware has experts stumped. Kaspersky Lab, a Moscow-based security vendor, has been dissecting Gauss.
Anti-Leaks launched its attack just as Wikileaks began releasing information on a secret government surveillance program, Government Computer News reports.
Timothy Ryan joins Kroll Advisory Solutions as managing director.
Listen August 14th at 12pm
Program will discuss Progress Report on CyberSecurity in the Federal Government, Top CyberSecurity Priorities , Key Challenges to still overcome in IT Security, Lessons Learned , and a Vision for The Future
The Energy Department is asking electric utilities to make cybersecurity a top priority. It called for a cybersecurity governance board that would share information with the DoE.
The secret-busting organization WikiLeaks says it's been the victim of a sustained denial-of-service attack which has left its website sluggish or inaccessible for more than a week.
The FBI is warning the public of a new "drive-by" virus that is sending fake messages that appear to be from federal agencies.
Most IT managers are moving data to the cloud, but 40 percent of them believe doing that will weaken security of that data.
A new computer virus tied to some of the most sophisticated cyberweapons thus-far discovered has been found circulating in the Middle East, a Moscow-based computer security company said Thursday. If a link were confirmed, the find would expand the electronic arsenal reportedly deployed by the U.S. and Israel against their rivals in the region.
Instead of using a lengthy security technical implementation guide approval process to decide which tablets and smartphones will be allowed to use its network, the Defense Information Systems Agency wants to put the ball in the vendors' court.