Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
he U.S. Department of Justice says at least some materials sealed as part of the court case against seven men involved in the 1972 Watergate burglary should be released.
One senator is questioning why it took nine months for the Thrift Savings Plan board to find out about a sophisticated cyber attack that compromised 123,000 TSP participants' accounts. Sen. Susan Collins (R-Maine) also wants to know why Congress wasn't informed of the breach until more than a month after it was reported to the board.
A survey of nearly 60,000 college students found some federal agencies rank high as ideal employers post-graduation.
The FBI has awarded ManTech International Corp. a $77 million contract to provide support services for the bureau's Criminal Justice Information Services Division.
A search prompted by a bomb threat at a U.S. Army base in Utah has ended with an FBI spokeswoman saying agents have not turned up anything suspicious.
The House approved the first spending bill for 2013, setting operating budgets for the Commerce and Justice Departments and for science-related agencies, such as NASA.
The FBI's former top cyber cop has taken a job with a startup company to help protect private-sector computer networks that he says are already under constant attack with intrusions.
Many forward-thinking enterprises in the government and commercial sectors are using cloud environments to improve scalability, agility, automation, and efficiency. The operating landscape for these organizations is rapidly evolving: Costs are reduced. Data is ubiquitous. Information is flowing from more sources than ever before. However, the same features that create such high promise for the cloud also bring a potential for new levels of criminal exploitation through fraud. A distinguished panel of top experts will look at the new face of fraud in a digital age, provide insights in how to prevent, detect and investigate fraud in the cloud and identify options to combat fraud in the cloud computing world.
For seven years, E.J. O'Malley has been a health and fitness instructor at the FBI Academy in Quantico, Va. Four times a year, he instructs law enforcement personnel from across the U.S. and around the world at the FBI's National Academy - a 10-week course that includes a comprehensive physical training program. Read O'Malley's story as part of our "Cool Jobs in Government" series.
A lawyer for FBI whistleblower Sibel Edmonds said Tuesday the bureau's prepublication review office has adopted overly expansive restrictions that are preventing Edmonds from publishing a book about her life at the FBI.
The FBI's Criminal Justice Information Services says local law enforcement needs to encrypt its data if it wants to join the cloud. The FBI said when information is encrypted from the start, police can have control of its cybersecurity on any cloud system, according to a post on InfoSecurity.
The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.
The FBI's chief information officer, Chad Fulgham, will step down next month after three years at the helm of the agency's information technology efforts, the FBI announced in a release.
FBI allowed the servers to run for 120 days to give owners of infected computers time to clean out the DNSchanger malware. But the bureau dropped the ball on getting the word out.
The American computer hacker who shocked other Internet saboteurs by becoming an FBI informant didn't just break the law on the Web: He also carried a gun and was involved in drug dealing.
Rep. Adam Smith of Washington state and Sen. Mark Udall of Colorado introduced legislation that would repeal provisions of the defense bill that President Barack Obama signed into law Dec. 31.
Testifying before a House subcommittee, FBI Director Robert Mueller said terrorists have not used the Internet to launch a full-scale cyber attack, but the bureau does not underestimate an enemy's desire to do so.
The FBI has identified and charged several key members of the hacker collective Anonymous and at least one member of the loose-knit group has turned FBI informant. Alan Paller, the director of research at the SANS Institute joined In Depth with Francis Rose to discuss the recent cybersecurity developments.
An interagency group of senior officials will brief Senate lawmakers today on what would be the response if the nation's critical infrastructure suffered a cyber attack. The meetings come as Senate lawmakers debate two cyber bills that try to address critical infrastructure protection.
An Irish police officer's email blunder led to the spectacular leak of a sensitive conference call between the FBI and Scotland Yard, U.S. law enforcement said Tuesday.