Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Inside the Reporter's Notebook: Communication breakdown over FITARA? Lawmaker wants answers from DHS
News and buzz in the acquisition and IT communities that you may have missed this week.
The idea behind cyber threat intelligence is to understand more about the attack and the attacker than ever before by matching up patterns, anomalies and other characteristics of the bad guys. Energy, DoD, Commerce and DHS are all analyzing cyber attack data to develop this more complete picture.
Pro-business cybersecurity bill sails through House again, but without clear path ahead
An update to the Federal Information Security Management Act and the Cybersecurity Enhancement Act of 2013 passed through the House Tuesday night. The Cybersecurity Information Sharing and Protection Act also passed, but faces a veto threat because of concerns over data protection.
House panel approves pro-business cybersecurity bill over protests by civil liberties groups
The House Intelligence Committee is trying to revive legislation that would let industry and the federal government swap information on the latest cyber threats.
The federal cyber workforce is not facing an immediate retirement wave, but it will if agencies don't increase the number of younger workers.
Collaboration and a better way to measure risk emerge as the two main factors in developing a more integrated approach to protecting critical infrastructure systems and networks. At the first of four workshops, NIST got the lowdown from owners and operators as well as information sharing centers on what's working and what needs to be at the forefront as the framework is developed.
An independent group's report offers ways for agencies to evolve to continuous monitoring and risk-based approaches to cybersecurity within the existing Federal Information Security Management Act, and proposes more cooperation between CIOs and agency inspectors general.
Carnegie Mellon University and one of the government's top spy agencies want to interest high school students in a game of computer hacking.
Officials aim to redefine operational series codes for civilian cybersecurity workers and offer more pay for additional expertise. The Air Force would like to create an elite cadre of civilian cyber warriors.
The agency in an email to contractors said information including social security numbers and bank account information were publicly assessable. GSA is offering credit monitoring services to those affected.
Cyber coordinator Michael Daniel released updated goals for TIC, HSPD-12 and continuous monitoring on Performance.gov. He said by adding new goals to the portal, performance improvement officers will pay more attention and influence how agencies meet the targets.
The House Science, Space and Technology Committee approved two cybersecurity bills this week. Both bills were approved by the House last term, but never came up for a vote in the Senate. That chamber is considering a comprehensive approach to cyber legislation.
Mark Weatherford, the National Protection and Programs Directorate (NPPD) deputy undersecretary for cybersecurity, will leave the agency on April 12 after accepting a job in the private sector.
U.S. Cyber Command is putting together dozens of groups to defend the military's network, to work with combatant commanders on offensive tactics and to respond to attacks against the nation. Gen. Keith Alexander, however, said budget cuts will delay DoD's ability to recruit and train team members.
Federal agencies reported more than 48,000 cyber attacks in 2012 and continue to struggle to defend their networks, according to a new report from the Government Accountability Office. Senators are now renewing their push for comprehensive cyber legislation, which would include an update to FISMA.
Watchdog says VA sent sensitive patient data over unencrypted networks, posing security risk
FedRAMP and other initiatives are helping CIOs become more comfortable with securing data and applications in the cloud. But changing the way agencies buy, manage and oversee technology is a bigger roadblock in moving systems to the cloud.
The Pentagon's commercial device implementation plan, made public Tuesday, aims at near-term implementation of a new generation of mobile devices such as iPhones, iPads and Android handhelds and tablets on both classified and unclassified networks.