Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
The National Institute of Standards and Technology kicks off the Global City Teams Challenge in September. Tech-savvy members from the federal government and private sector will come together to address issues including air quality, traffic management and emergency services coordination, all through the use of smart technology. Sokwoo Rhee, associate director for Internet of Things and Cyber-Physical Systems at NIST, joined Tom Temin on the Federal Drive to discuss what the agency hopes to accomplish.
VA, which has been eyeing a replacement for its scheduling system long before the current scandal, plans to issue a final request for proposals by the end of next month and make an award by the end of the year.
Boston University researchers think they've found a new way to build a cybersecurity system. The Modular Approach to Cloud Security wins a $10 million grant from the National Science Foundation's Secure and Trustworthy Cyberspace program. The goal is to build a cloud made up of small functional components, each with their own security capabilities. Ran Canetti is director of the Center for Reliable Information Systems and Cybersecurity at Boston University and leads the project. He explained what a clear and transparent cloud might look like on In Depth with Francis Rose.
In his new role, Chief Technology Officer Todd Park will leave the White House and head west to recruit tech whizzes from Silicon Valley to help the government.
The Defense Information Systems Agency will begin to shake up its organizational chart in significant ways beginning on Oct. 1. But officials, so far, are reluctant to discuss the details.
New details emerge about the cyber attack against USIS. Hackers accessed personal information of Department of Homeland Security workers, including Social Security numbers, dates of birth and addresses. DHS will offer credit monitoring services to the affected employees.
Official says breach at security clearance contractor affects up to 25,000 federal workers
Engineer Patrick DeGroodt helps build Army's communications network, Warfighter Information Network-Tactical Increment Two.
The indefinite-delivery/indefinite-quantity award will converge the heterogeneous IT architectures aboard Navy ships - all 630 of them - into a single, standards based architecture.
Citing threats from hackers, US won't release security details for federal health care website
The Defense Information Systems Agency, which serves as the broker between Defense Department components and commercial providers of cloud computing services, says the certification standards it set for commercial providers may be too arduous for vendors. DoD also launched five pilots to test the use of commercial cloud providers and is reassessing how it develops cloud requirements.
The National Security Agency closed down an office dedicated to mobility, because devices and apps have become part of the fabric of everything the agency does. But NSA, like all agencies, still must figure out how to secure mobile devices using derived credentials.
Dawn Leaf, Labor's deputy chief information officer, said the agency is moving to a centralized infrastructure and hopes to give its bureaus a platform on which to build mission-critical apps.
Todd Weller of Hexis Cyber discusses the types of security threats federal agencies are facing on this week's Federal Tech Talk radio show.
Listen Tuesday August 19th @ 12pm
Bob Brese is leaving government after almost 30 years, including the last 11 at the Energy Department.
The fast-growing number of devices connected to the Internet means enterprises need to rethink their approaches to cybersecurity. Cyber expert Melissa Hathaway says we're at a cyber inflection point. She's the president of Hathaway Global Strategies and former director of the Joint Interagency Cyber Task Force. She joined Tom Temin on the Federal Drive to discuss the top concerns for cybersecurity.
Agencies are struggling to find a good way to ensure employees have access to only the information they are supposed to have access to. Now, one could be close to a solution. The Air Force is launching a pilot program to test role-based authentication. Federal News Radio's Executive Editor Jason Miller joined Emily Kopp on the Federal Drive with details. Read Jason's related article.
The service will test out a role-based authentication technology on an application in the MilCloud run by DISA. Frank Konieczny, the Air Force's chief technology officer, said the pilot could move into full production in six months. DoD is considering adding the role-based capability to the JIE framework.
The Army has thousands of personnel working full-time on cyber, but so far, those soldiers have no dedicated career path. That may be about to change.