Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Federal News Radio polled current and former federal cybersecurity experts for their opinions on what were the most significant cybersecurity accomplishments since 2006 to secure federal networks and improve public- private partnerships. The accomplishments are in no particular order.
The draft solicitation asks for 15 toolsets and 11 service areas to help agencies implement continuous monitoring as-a-service and to buy sensors. DHS has asked vendors on GSA Schedule 70 to comment on the requirements.
Recruits in the Federal Air Marshal Service undergo 16 weeks of rigorous training to prepare for their primary duty - helping travelers reach their destinations unharmed. Every three months, air marshals receive refresher training in hand-to-hand defense, physical fitness and threat-scenarios aboard a life-size mockup of a passenger jet. Federal News Radio goes inside a flight simulator for a first-hand look at a training exercise.
The White House issued a seven-page executive order Saturday directing U.S. spy agencies to share intelligence about cyberthreats with companies operating electric grids, water plants, railroads and other vital industries. Defense Secretary Leon Panetta said the military was prepared to retaliate if the U.S. is attacked by cyberweapons.
The Transportation Security Administration on Friday moved to fire 25 employees at Newark Liberty International Airport and suspend 19 others for what it said was improper screening of checked luggage, the latest in a series of problems at one of the country's busiest airports.
Homeland Security Department Secretary Janet Napolitano approved the reorganization plan earlier this week. The newly aligned Office of Cybersecurity and Communications expands from three divisions and creates a new performance-management office.
Republican lawmakers in the House and Senate wrote to President Barack Obama urging him to not issue an executive order setting voluntary cybersecurity standards for private-sector operators of critical infrastructure.
More than eight years after the White House issued Homeland Security Presidential Directive-12 requiring the issuance of secure identity cards, governmentwide and agency-specific initiatives provide hope the smart cards can be more than "glorified ID cards." NIST and GSA are developing an identity exchange in the cloud. DHS and IRS are putting their cards to use at a local level for both building and computer access.
A preliminary investigation has found friendly fire likely was to blame in a shooting that killed one federal agent and wounded another along the Arizona-Mexico border, the FBI said Friday.
The Homeland Security Advisory Council Task Force on Cyberskills submitted 11 recommendations to the DHS secretary on how to improve the agency's cyber workforce. The committee said DHS must define the skills needed to protect .gov networks. It also suggested setting testing and certification standards.
Agencies are missing out on billions of dollars in savings by not using strategic-sourcing contracts, particularly when buying services, according to a new report from the Government Accountability Office. The report finds the Departments of Defense, Homeland Security, Veterans Affairs and Energy spent less than 5 percent of their combined acquisition budgets through strategic sourcing and saved less than $2 billion.
Stinging criticism from Congress about a counterterrorism effort that improperly collected information about innocent Americans is turning up the heat on the Obama administration to justify the program's continued existence and putting lawmakers who championed it on the defensive.
The agency plans to release solicitations to help agencies implement sensors to detect threats, followed by industry-provided services to analyze them. Congress approved $183 million to begin in 2013 to help get continuous monitoring off the ground more quickly.
Agency leaders take steps to show they're serious about employee fraud. Too often, they're relying on the inspector general's office to detect corruption.
The Energy and Homeland Security departments are working with companies in the electricity sector to come up with a baseline set of cybersecurity standards. Michael Daniel, the White House cyber coordinator, said the framework is making a difference in how owners and operators secure their networks. But Rep. Mike Rogers (R-Mich.) said without liability protections expansion of these efforts isn't likely.
The agency has chosen to let some acquisition schedules slip, as a solution to constrained budgets. By doing so, CBP increases the likelihood of successful acquisition projects, said an agency executive.
The agency is changing its approach to the Einstein tool to keep up with the changing technology. Mark Weatherford, under secretary for cybersecurity, said on Agency of the Month that DHS is helping agencies be more proactive in defending their networks. He isn't worried about the turnover in his office.
Napolitano said there were a few outstanding issues and President Barack Obama has not yet reviewed the document.
The Government Accountability Office said reports of malware targeting mobile devices have nearly tripled in less than a year.
Peggy Sherry, the agency's CFO, said when budget cuts do come they are prepared. DHS has been finding efficiencies in its spending and asked components to think hard about how they spend their money.