Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
- Veterans in Private Sector: Making the Transition
Shows & Panels
Instead of using a lengthy security technical implementation guide approval process to decide which tablets and smartphones will be allowed to use its network, the Defense Information Systems Agency wants to put the ball in the vendors' court.
An updated how-to guidance for responding to cyber incidents is out.
President Barack Obama may use his authority to issue orders compelling or encouraging private industry to meet minimum security standards to protect their computer networks from attacks by hackers or foreign governments, White House counterterrorism adviser John Brennan said Wednesday.
F-Secure analyzed 19 new families of mobile malware. It found a big increase in products that target Android.
The National Institute of Standards and Technology is making it easier for agencies to test the use of logical access control for applications.
Auditors found no security weaknesses that present an immediate threat to the jobs portal or user information housed in its database. The test represented the site's first independent security evaluation since OPM took control over USAJobs.gov from Monster Government Solutions in Oct. 2011. Under MGS management, hackers broke into the portal twice in 17 months.
Department says 99 percent of laptops now are encrypted. Of the 21 laptops reported stolen or missing in the last two months, all were secured with security software.
On this week's Bloomberg Government Capital Impact show, analysts will discuss which cybersecurity companies are being targeted for mergers and acquisitions. Plus, what's next in the internet tax debate and how are companies benefiting from the R&D tax credit.
August 2, 2012
The Senate failed Thursday to pass legislation to protect the U.S. electrical grid, water supplies and other critical industries from cyberattack and electronic espionage, despite dire warnings from top national security officials about the potential for devastating assaults on American computer networks.
The Social Security numbers and bank routing numbers of about 8,000 accounts were exposed in a cyber breach of an Environmental Protection Agency database.
A battle over the role companies should play in keeping the U.S. safe from cyber attacks threatens to kill cybersecurity legislation in the Senate
The contract includes "very stringent" IT security requirements. The announcement follows a data breach that affected 123,000 TSP participants in 2011.
The White House is updating its 2010 trade secret theft and counterfeit product prevention strategy. The new plan will incorporate public input, which the administration is currently soliciting from stakeholders.
NSA director Gen. Keith Alexander gave the keynote at this year's Defcon in Las Vegas.
Two years after U.S. Cyber Command became operational, the military services that provide its cyber forces are beginning to more tightly define their respective responsibilities in the joint cyber environment. Gen. Keith Alexander issued a memo recently giving each of the services a lead cyber role for specific geographic areas of the world.
Hits on infrastructure such as electricity grids and water supplies increased 17-fold between 2009 and 2011.
The Veterans Affairs Department will award a $5 billion IT hardware contract in the next two months. GSA will release a request for information for cybersecurity tools in the coming days. Both are examples of a healthy and busy fourth quarter for acquisition.
The Pentagon is still grappling with how to write the rules of cyberwarfare, such as when and how to fire back against a computer-based attack, senior military leaders told Congress Wednesday.
Matt Coose left government after more than 20 years. In his final position as director of the Federal Network Service at DHS, he said the agency's cyber capabilities matured. And agency focus on securing federal networks has never been better.