Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Information Technology News
Fred Baillie, the DLA's chief of staff, joined In Depth with Francis Rose to discuss how the agency's new Task Management Tracker.
Defense minister describes country's websites as operating at a "general threat" level.
Federal Agencies submitted their 2011 FOIA reports earlier this month, and all that information goes up on your agency's website and at FOIA.gov by Feb. 1.
Is your IT shop actively involved in your telework program? Here's a few reason they should be.
Former E-Government and IT Administrators Mark Forman and Karen Evans count down the top federal IT news stories of the year.
The White House released the new plan to focus on four broad areas to improve cybersecurity in the government and in the private sector. Howard Schmidt, the White House cyber coordinator, said agencies will issue RFPs and RFIs to meet the strategy's goals.
The Army's senior leaders want the service to beat its 2015 target to cut down the number of data centers it uses.
Agencies must report data center consolidation savings this week to OMB in preparation for 2013 budget request. The administration keeps the IT passback guidance short with a focus only on a few priorities over the next year.
John Wonderlich of the Sunlight Foundation talks about his organization's review of the Open Government Directive. How well have agencies complied with mandate?
Dan Saaty of Decision Lens joins host John Gilroy to discuss how prioritization software can help your agency.
December 13, 2011(Encore presentation December 27, 2011)
Martha Dorris, the deputy associate administrator of GSA's Office of Citizen Services and Innovative Technologies, told In Depth with Francis Rose that Search.USA.gov doesn't compete with commercial search giants, such as Google. Instead, the site relies on the commercial search providers to get information seekers on government sites, where USASearch can act as a "traffic cop" directing them to the most high-value content.
The DoD Cyber Command poked and prodded the Army Corps' Los Angeles district's network during a recent Command Cyber Readiness Inspection. Army Corps of Engineers CIO Bob Kazimer said the analysis will give the rest of the agency lessons learned to improve cybersecurity across the Corps.
December 15, 2011
OMB sets a six-month deadline for initial capabilities to be ready. Along with the cloud security standards and process, the administration highlighted other accomplishments on the one-year anniversary of the 25-point IT Reform plan. The White House said a new draft shared services strategy will focus on commodity IT services.
The goal of the revised FIPS-201-2 will detail at a high level how agencies can integrate secure smart cards with mobile devices. NIST is considering five options for making HSPD-12 cards work with tablets and smart phones.
The joint cyberspace training exercise was held at the Air Force Red Flag Facility at Nellis Air Force Base in Nevada.
For the past year, the Library of Congress has been working with Twitter in a transfer of the company's entire electronic data set. Library's digital director sees this as a "unique record of our time."
Viewing cybersecurity as a growth area, Raytheon buys up its ninth cybersecurity firm since 2007.
Phil Cirrulli, the chief information officer for the managing and operations contractor for the site, is improving the national lab's infrastructure to support widespread wireless access. He also is shutting down legacy mainframe systems after implementing a new ERP system.
December 1, 2011
USA Search, which hosts search services over more than 500 government sites, topped the list of award winners presented by CTOlabs.com.
In June 2011 alone, Adobe software received more than 14,000 attacks, compared to only 1,500 attacks on Microsoft products.