Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Dan Juengst, senior cloud strategist for Red Hat discusses how his company is helping federal agencies with their cloud computing needs.
June 11, 2013
Snowden, an employee of Booz Allen, one of 500,000 contractors with top security clearance
Hagel says budget forces review of outside contractors such as NSA leaker
Booz Allen Hamilton announced Tuesday it has fired Edward Snowden, the contractor employee who admitted leaking details about classified National Security Agency programs to reporters. The company said Snowden was fired June 10 because he violated company policies, including its code of ethics.
Edward Snowden, a former technical assistant for the CIA and current employee of defense contractor Booz Allen Hamilton, revealed himself Sunday as the source of disclosures about the U.S. government's secret surveillance programs, risking prosecution by the U.S. government. Director of National Intelligence James Clapper called the revelation of the intelligence-gathering programs as reckless and said it has done "huge, grave damage."
NSA whistleblowers say agency casts wide net, Verizon order is part of 'routine'
Obama: Gov't not spying on Americans, surveillance programs needed to track terror threats
On this week's Capital Impact show, Bloomberg Government analysts discuss Fannie and Freddie underwriting practices, how much colleges and universities spend on lobbying, and how BRAC is changing the area around Fort Meade.
March 28, 2013
Carnegie Mellon University and one of the government's top spy agencies want to interest high school students in a game of computer hacking.
Wall's 21, Ariza's 20 help Wizards snap Knicks' 5-game winning streak, 106-96
NSA, DHS taking steps to improve information sharing by creating a set of standardized technical specifications that let machines detect cyber threats and communicate them to one another in real-time. Whole of government approach is starting to take shape when it comes to cybersecurity.
Senate version of the cyber legislation includes a provision to let the Homeland Security Department take specific steps to be more competitive in hiring cyber workers. Secretary Janet Napolitano said DHS is in the midst of hiring hundreds, but could use many more.
The White House issued a seven-page executive order Saturday directing U.S. spy agencies to share intelligence about cyberthreats with companies operating electric grids, water plants, railroads and other vital industries. Defense Secretary Leon Panetta said the military was prepared to retaliate if the U.S. is attacked by cyberweapons.
Intelligence Community Information Technology Enterprise will reach initial operating capability next March on the way to full implementation in 2018. The NGA and DIA are building a common desktop for all of the intelligence community agencies.
Agencies and universities are refining job descriptions, revamping training and education programs and helping industry, academia and government to begin to reach consensus on the makeup of a modern-day cybersecurity workforce. The Office of Personnel Management also has made changes to personnel systems so that job descriptions map to the framework. The plan already has had in impact on cyber education at colleges and universities across the country.
Military's cyber offense and defense strategies are being executed by two separate teams that can't sufficiently share knowledge, per the commander of U.S. Cyber Command
The developing field of using social media to gather information can provide benefits to the intelligence community, but it also involves challenges. The changing environment of open source intelligence requires agencies and companies plan their approaches carefully.
NSA director Gen. Keith Alexander gave the keynote at this year's Defcon in Las Vegas.
The Pentagon is still grappling with how to write the rules of cyberwarfare, such as when and how to fire back against a computer-based attack, senior military leaders told Congress Wednesday.
New security measures, including a new polygraph question, will help avoid leaks from intelligence employees, announced James Clapper, director of National Intelligence. Lawyer John Mahoney analyzes the legal responsibilities between agencies and federal employees.