Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
The U.S. Department of Homeland Security is advising people to temporarily disable the Java software on their computers to avoid potential hacking attacks.
The semi-annual regulatory agenda highlights final and proposed changes to the federal acquisition and agency-specific acquisition regulations.
News and buzz in the acquisition and IT communities that you may have missed this week.
A Drug Enforcement Administration agent arranged to hire a prostitute for a Secret Service agent in Colombia in advance of a presidential visit last year.
The Obama administration spent more money on immigration enforcement in the last fiscal year than all other federal law enforcement agencies combined, according to a report on the government's enforcement efforts from a Washington think tank.
Charlie Armstrong, the agency's assistant commissioner for the Office of Information and Technology and chief information officer, said a new cloud initiative is the target environment for mission support systems. CBP recently moved all of its employees to email-in-the-cloud.
January 3, 2013
A Senate report found that changes made by intelligence agencies were the origin of confusing explanations after the attack on U.S. diplomatic facilities in Benghazi, Libya.
The blanket purchase agreement lists 15 tools and 11 service areas that DHS wants vendors to provide to improve agency cybersecurity.
Federal News Radio hosted an online chat with Charlie Armstrong, assistant commissioner and chief information officer at Customs and Border Protection. If you missed it live, view an archived version of the chat here.
The House this week approved a handful of bills aimed at improving federal financial management and oversight of government operations. Two of the bills — one requiring the Homeland Security Department to pass a complete financial audit and the other lightening the mandatory caseload of the Government Accountability Office — have already been passed by the Senate and head to the president's desk for his signature.
U.S. Border Patrol agents will no longer serve as interpreters when local law enforcement agencies request language help, according to a new decree issued by the Department of Homeland Security.
Several departments are seeing the benefits from governmentwide collaboration. The interagency National Intellectual Property Coordination Center used its relationships to get the word out more quickly about counterfeit air bags that potentially could explode on impact. HR University absorbed millions of dollars in performance management training courses from an agency who on the CHCO Council.
The agency developed a playbook to help officials keep their processes and procedures unpredictable. Deputy Administrator John Halinski said TSA is using a risk-management approach to protecting transportation systems. GAO said DHS as a whole is doing a better job using risk to make decisions.
The Homeland Security Department paid for an underwater robot in a Midwest city with no major rivers or lakes nearby, a hog catcher in rural Texas and a fish tank in a small Texas town, according to a new congressional report highlighting what it described as wasteful spending of tax money intended for counterterrorism purposes.
The Homeland Security Department would be required to conduct and pass a full financial audit under a bill unanimously approved by the Senate on Wednesday. The DART Act requires the agency, long characterized by the Government Accountability Office as being at high-risk for waste and abuse, to reach a clean audit opinion by 2013.
A senior agent for Immigration and Customs Enforcement and the government have agreed to settle a discrimination lawsuit, according a court record filed Thursday.
A pair of Mexican drug smugglers in camouflage pants, bundles of marijuana strapped to their backs, scaled a 25 foot-high fence in the middle of the night, slipped quietly into the United States and dashed into the darkness.
NSA, DHS taking steps to improve information sharing by creating a set of standardized technical specifications that let machines detect cyber threats and communicate them to one another in real-time. Whole of government approach is starting to take shape when it comes to cybersecurity.
President Barack Obama is gearing up for a second term in office, but some members of his Cabinet are on their way out, experts tell Federal News Radio. The legwork for these top- tier changes and others is already in motion behind-the-scenes.
The Consortium for Cybersecurity Action, a newly-formed international group of government agencies and private organizations from around the world, today will release an updated baseline of the 20 most important cyber controls. The group wants to become a resource to help agencies implement those security checks. DHS already is developing a solicitation to make it easier for agencies to buy tools and services to implement several of the security checks.