Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
A search prompted by a bomb threat at a U.S. Army base in Utah has ended with an FBI spokeswoman saying agents have not turned up anything suspicious.
The House approved the first spending bill for 2013, setting operating budgets for the Commerce and Justice Departments and for science-related agencies, such as NASA.
The FBI's former top cyber cop has taken a job with a startup company to help protect private-sector computer networks that he says are already under constant attack with intrusions.
Many forward-thinking enterprises in the government and commercial sectors are using cloud environments to improve scalability, agility, automation, and efficiency. The operating landscape for these organizations is rapidly evolving: Costs are reduced. Data is ubiquitous. Information is flowing from more sources than ever before. However, the same features that create such high promise for the cloud also bring a potential for new levels of criminal exploitation through fraud. A distinguished panel of top experts will look at the new face of fraud in a digital age, provide insights in how to prevent, detect and investigate fraud in the cloud and identify options to combat fraud in the cloud computing world.
For seven years, E.J. O'Malley has been a health and fitness instructor at the FBI Academy in Quantico, Va. Four times a year, he instructs law enforcement personnel from across the U.S. and around the world at the FBI's National Academy - a 10-week course that includes a comprehensive physical training program. Read O'Malley's story as part of our "Cool Jobs in Government" series.
A lawyer for FBI whistleblower Sibel Edmonds said Tuesday the bureau's prepublication review office has adopted overly expansive restrictions that are preventing Edmonds from publishing a book about her life at the FBI.
The FBI's Criminal Justice Information Services says local law enforcement needs to encrypt its data if it wants to join the cloud. The FBI said when information is encrypted from the start, police can have control of its cybersecurity on any cloud system, according to a post on InfoSecurity.
The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.
The FBI's chief information officer, Chad Fulgham, will step down next month after three years at the helm of the agency's information technology efforts, the FBI announced in a release.
FBI allowed the servers to run for 120 days to give owners of infected computers time to clean out the DNSchanger malware. But the bureau dropped the ball on getting the word out.
The American computer hacker who shocked other Internet saboteurs by becoming an FBI informant didn't just break the law on the Web: He also carried a gun and was involved in drug dealing.
Rep. Adam Smith of Washington state and Sen. Mark Udall of Colorado introduced legislation that would repeal provisions of the defense bill that President Barack Obama signed into law Dec. 31.
Testifying before a House subcommittee, FBI Director Robert Mueller said terrorists have not used the Internet to launch a full-scale cyber attack, but the bureau does not underestimate an enemy's desire to do so.
The FBI has identified and charged several key members of the hacker collective Anonymous and at least one member of the loose-knit group has turned FBI informant. Alan Paller, the director of research at the SANS Institute joined In Depth with Francis Rose to discuss the recent cybersecurity developments.
An interagency group of senior officials will brief Senate lawmakers today on what would be the response if the nation's critical infrastructure suffered a cyber attack. The meetings come as Senate lawmakers debate two cyber bills that try to address critical infrastructure protection.
An Irish police officer's email blunder led to the spectacular leak of a sensitive conference call between the FBI and Scotland Yard, U.S. law enforcement said Tuesday.
The director of the FBI told an annual gathering of cyber-security professionals on Thursday that the agency needs the private sector to help combat what he believes is becoming the nation's No. 1 threat.
A federal agent who was killed after shooting his supervisor in a workplace confrontation in California had been the subject of complaints by immigrant advocates for allegedly using coercive tactics with immigrants after a 2010 raid, according to court papers filed on Thursday.
Within the last week, authorities say, Amine El Khalifi's plan to wreak havoc was proceeding as hoped: An al-Qaida associate handed him an automatic weapon to kill security officers inside the U.S. Capitol. A bomb-laden vest would detonate the building. He would die as a martyr.
Trading jokes and swapping leads, investigators from the FBI and Scotland Yard spent the conference call strategizing about how to bring down the hacking collective known as Anonymous, responsible for a string of embarrassing attacks across the Internet.