Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
In his first interview ever, John DeLong, the compliance director at the National Security Agency, clears up the misconceptions that exist about his job as well as the work done in his office. He says compliance is where rules intersect with technology, people and the activities at NSA.
Gen. Keith Alexander, who runs the National Security Agency, endorsed the idea of using a cloud computing facility to share cybersecurity information with the private sector.
Debora Plunkett, the director of the National Security Agency's Information Assurance Directorate, said there is good news and bad news when it comes to protecting the U.S. from cyber threats on a daily basis. In an exclusive interview for Federal News Radio's Agency of the Month program, Plunkett said getting the nation's networks to a higher level of security is multifold.
Efficient recruitment and hiring practices might seem like a hard get at a high-security agency like NSA. But Kathy Hutson, the director of human resources at the National Security Agency, says the hiring protocols at her agency today demostrate all the reforms the Office of Personnel Management is recommending for the rest of government.
The House voted to give the intelligence community a few billion dollars more Thursday than the White House wanted for next year's budget _ a price tag that covers the range of intelligence needs from the CIA to the high-tech satellites that spied on Osama bin Laden's compound.
The White House registered its objection before the vote, but did not threaten to veto the bill, which the House passed 386-28.
The National Security launched its National Centers of Academic Excellence in Cyber Operations Program which will provide seminars and classes for interested students with hopes of building up the future cybersecurity workforce. The classes supplement the students' regular IT courses with lessons on cyber ethics and new technologies.
A search prompted by a bomb threat at a U.S. Army base in Utah has ended with an FBI spokeswoman saying agents have not turned up anything suspicious.
A pilot program DoD established to share cyber threat information between the NSA and Defense companies will be made permanent and expanded to include approximately 200 companies in the coming months.
At the Fed SMC Conference in Cambridge, Md., Federal News Radio's Tom Temin caught up with Chris Inglis, deputy director of NSA. He talked about a number of current issues, starting with cybersecurity.
The Pentagon still is responding to major cyber attacks on the nation after the fact, the military's top cyber official said Tuesday. It would rather stop them before they succeed.
Cyber attacks against federal websites and networks went up only 5 percent between 2010 and 2011.
Call for papers aims at developing protection for federal technology systems against cyber attacks.
Troy Lange, the mobility mission manager in the National Security Agency's Information Assurance Directorate, joined In Depth with Francis Rose to discuss mobile risk management.
The National Security Agency's Central Security Service cut the ribbon on a new cyber facility in Georgia. The Georgia Cryptologic Center cost $286 million.
The National Security Agency has developed a better — and more economical approach — to fighting malware. Eric Chudow, a technical director for government mitigations in the NSA's Information Assurance Directorate, joined In Depth with Francis Rose to discuss the new method.
Hackers might be gearing up to shut off power in your office. National Security Agency Director General Keith Alexander says the group Anonymous might have that capability in the next year or two.
Lawmakers at odds over critical infrastructure protection provisions. Sen. McCain promised to introduce a new version of a comprehensive cyber bill to focus on collaboration and information sharing instead of regulation of critical infrastructures. Sens. Joseph Lieberman and Susan Collins refute the criticism, saying they've held 10 hearings, hundreds of meeting and pleaded with others in the Senate to offer comments.
Thanks to the National Security Agency, there is now a security enhanced version of Android. This project is designed for agencies with strict access-control policies, such as the Defense Department.
The National Security Agency is developing cyber guidelines for its systems and ultimately any government or contractor network.
The Electronic Privacy Information Center is suing the Homeland Security Department and the National Security Agency. In both cases, EPIC is unhappy with how the government responded to its Freedom of Information Act requests.