Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
If the claims are true, it means hackers could spy on network traffic, obtain credentials to get on the inside and attack the power plants.
The research agency DARPA is hosting a daylong event Sept. 27 on its upcoming "Plan X" that focuses on building solid attack strategies and tools.
The department is trying to figure out the best way to manage the cards of contract employees after they leave the department. Every agency using a managed service provider for secure identity card issuance faces a similar challenge. Commerce also is working on integrating physical and logical access systems.
Sources say the Defense Department is behind on implementing the new plan and may in fact be exploring other options.
The Army chief information officer said the military service was well on its way to completely migrating to the cloud-based email by March.
The military, working through DARPA, is trying to develop its own marketplace of apps for helping troops in the field.
They say hackers who want to steal cars or just eavesdrop on conversations may have an easy time of it.
ikileaks founder Julian Assange portrayed himself Sunday as a victim of an American "witch hunt."
OMB issued fiscal 2014 technology project guidance detailing the steps agencies should take to reduce spending across six areas. Agencies also must tell OMB how it would reinvest the savings into new or innovative projects.
The command hopes to attract cyber pros with special incentives, including bonuses and education benefits.
A Google spokesman said he company plans to enhance it apps with functions already offered by Postini, an email security company owned by Google.
The National Institute of Standards and Technology is working on updating guidelines for Transport Layer Security. That technology prevents anyone from eavesdropping on Internet communications.
The Defense Department's goal is to enhance training and cyber situational awareness.
The mysterious Gauss cyber-surveillance malware has experts stumped. Kaspersky Lab, a Moscow-based security vendor, has been dissecting Gauss.
Anti-Leaks launched its attack just as Wikileaks began releasing information on a secret government surveillance program, Government Computer News reports.
Timothy Ryan joins Kroll Advisory Solutions as managing director.
Listen August 14th at 12pm
Program will discuss Progress Report on CyberSecurity in the Federal Government, Top CyberSecurity Priorities , Key Challenges to still overcome in IT Security, Lessons Learned , and a Vision for The Future
The Energy Department is asking electric utilities to make cybersecurity a top priority. It called for a cybersecurity governance board that would share information with the DoE.
The secret-busting organization WikiLeaks says it's been the victim of a sustained denial-of-service attack which has left its website sluggish or inaccessible for more than a week.
The FBI is warning the public of a new "drive-by" virus that is sending fake messages that appear to be from federal agencies.