Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
NSA, DHS taking steps to improve information sharing by creating a set of standardized technical specifications that let machines detect cyber threats and communicate them to one another in real-time. Whole of government approach is starting to take shape when it comes to cybersecurity.
Identity management, standup of Cyber Command, and information sharing with the industrial base have been cited as key cyber accomplishments in the Department of Defense. But much work remains, experts say.
A draft executive order directs U.S. spy agencies to share the latest intelligence about cyberthreats with the companies operating electric grids, water plants, railroads and other vital industries in order to protect them from electronic attacks.
Maj. Gen. John Davis moves up from the position of director of current operations at the Cyber Command.
Military's cyber offense and defense strategies are being executed by two separate teams that can't sufficiently share knowledge, per the commander of U.S. Cyber Command
The command hopes to attract cyber pros with special incentives, including bonuses and education benefits.
The director of intelligence at U.S. Cyber Command said the command has the capacity to significantly damage a country's infrastructure if necessary. Rear Adm. Samuel Cox said such an attack would only come after officials at the highest levels of government approved the operation because there would be a risk of collateral damage.
The top lawyer for U.S. Cyber Command, Air Force Col. Gary Brown, calls the Stuxnet attack the model of a responsibly conducted cyber attack. Catherine Lotrionte, the executive director of George Washington University's Institute for Law, Science and Global Security joined In Depth with Francis Rose to discuss Stuxnet.
An interagency group of senior officials will brief Senate lawmakers today on what would be the response if the nation's critical infrastructure suffered a cyber attack. The meetings come as Senate lawmakers debate two cyber bills that try to address critical infrastructure protection.
Lt. Gen. Bill Lord, the chief information officer of the Air Force, spoke with Federal News Radio's Jason Miller at the recent AFCEA Air Force IT Day in Vienna, Va.
Gen. Keith Alexander, head of both the National Security Agency and U.S. Cyber Command, says defense networks are not defensible from cyber attacks. His plan for getting back on track includes consolidating the number of networks and data centers and moving toward cloud computing.
The Joint Staff is reviewing the doctrine, which should define when the military can go on the cyber offensive. Once it is approved, Cyber Command will put out guidance and tailor its training accordingly.
The outgoing chief of staff for U.S. Cyber Command said recently the military's professional cyber corps has strong, diverse capabilities.
The Navy's cyber command will welcome a new leader as it approaches its one-year anniversary since declaring full operational capability.
Rear Adm. Sean Filipowski will take over from Rear Adm. Jan Tighe as the deputy director of operations at Cyber Command.
The Government Accountability Office says the Defense Department needs to step up its cybersecurity training.
This cyber attack didn't go after people playing war games on their PlayStations. It targeted a company that helps the U.S. military do the real thing.
In a column for Federal News Radio, Ft. Meade Commander Col. Dan Thomas says, "By this fall, the official worker population of Fort Meade will have grown to more than 48,000. This is 13,000 more personnel than we had three years ago - you do the math: if BRAC growth is 5,400, who are all these other people?"
The Deputy commander of Navy Fleet cyber command Rear Admiral Bill Leigher explains the significance of this realignment.
The head of U.S. Cyber Command says cloud computing is part of his plan for staying ahead of the cyber threats that face the Defense Department. “A year from now we should be well on our way to having a hardened architecture proven and in place, which provides a new level of cybersecurity,” said General [...]