Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
The Defense Department plans to boost the ranks of cybersecurity professionals, increasing cyber staff at U.S. Cyber Command by more than five times to some 4,900 employees. But DoD's plan is daunting in more ways than one. The job qualifications and skills needed for the kinds of positions the Pentagon wants are rare and often require years of training and hands-on experience. And even if DoD looks outside the confines of the Pentagon to fill these roles, it's not entirely clear where the new cyber pros would come from.
An Iranian semi-official news agency says there has been another cyberattack by the sophisticated computer worm Stuxnet, this time on the industries in the country's south.
Air Force senior leaders assigned themselves several tasks after a summit on cyberspace in mid-November. But the service's role in cyberspace also awaits forthcoming guidance from the military's top leadership on the future of U.S. Cyber Command.
NSA, DHS taking steps to improve information sharing by creating a set of standardized technical specifications that let machines detect cyber threats and communicate them to one another in real-time. Whole of government approach is starting to take shape when it comes to cybersecurity.
Identity management, standup of Cyber Command, and information sharing with the industrial base have been cited as key cyber accomplishments in the Department of Defense. But much work remains, experts say.
A draft executive order directs U.S. spy agencies to share the latest intelligence about cyberthreats with the companies operating electric grids, water plants, railroads and other vital industries in order to protect them from electronic attacks.
Maj. Gen. John Davis moves up from the position of director of current operations at the Cyber Command.
Military's cyber offense and defense strategies are being executed by two separate teams that can't sufficiently share knowledge, per the commander of U.S. Cyber Command
The command hopes to attract cyber pros with special incentives, including bonuses and education benefits.
The director of intelligence at U.S. Cyber Command said the command has the capacity to significantly damage a country's infrastructure if necessary. Rear Adm. Samuel Cox said such an attack would only come after officials at the highest levels of government approved the operation because there would be a risk of collateral damage.
The top lawyer for U.S. Cyber Command, Air Force Col. Gary Brown, calls the Stuxnet attack the model of a responsibly conducted cyber attack. Catherine Lotrionte, the executive director of George Washington University's Institute for Law, Science and Global Security joined In Depth with Francis Rose to discuss Stuxnet.
An interagency group of senior officials will brief Senate lawmakers today on what would be the response if the nation's critical infrastructure suffered a cyber attack. The meetings come as Senate lawmakers debate two cyber bills that try to address critical infrastructure protection.
Lt. Gen. Bill Lord, the chief information officer of the Air Force, spoke with Federal News Radio's Jason Miller at the recent AFCEA Air Force IT Day in Vienna, Va.
Gen. Keith Alexander, head of both the National Security Agency and U.S. Cyber Command, says defense networks are not defensible from cyber attacks. His plan for getting back on track includes consolidating the number of networks and data centers and moving toward cloud computing.
The Joint Staff is reviewing the doctrine, which should define when the military can go on the cyber offensive. Once it is approved, Cyber Command will put out guidance and tailor its training accordingly.
The outgoing chief of staff for U.S. Cyber Command said recently the military's professional cyber corps has strong, diverse capabilities.
The Navy's cyber command will welcome a new leader as it approaches its one-year anniversary since declaring full operational capability.
Rear Adm. Sean Filipowski will take over from Rear Adm. Jan Tighe as the deputy director of operations at Cyber Command.
The Government Accountability Office says the Defense Department needs to step up its cybersecurity training.
This cyber attack didn't go after people playing war games on their PlayStations. It targeted a company that helps the U.S. military do the real thing.