Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
The Pentagon will complete the Joint Regional Security Stacks in the European theater by the end of this year, two years earlier than planned. DoD already has begun to construct this regional cyber approach in the U.S. as part of its Joint Information Environment program.
GSA awarded a $47.3 million contract to Metrica Team Venture to provide software and services under the continuous diagnostics and mitigation program. DHS expects the dashboard to offer a more insightful view of the cyber health of agency networks starting this fall.
New Snowden document reveals NSA collects all phone calls in a single foreign country
Technology has made it a lot easier for small businesses to function over the past few years. But with that ease comes many cybersecurity concerns.
Gen. Keith Alexander, who will soon retire as the first commander of U.S. Cyber Command, said his organization has matured to the point that it should join the club of unified commands that report directly to the President.
A higher slot on the military's organizational chart for U.S. Cyber Command.
Rob Anderson, the chief of the Vision and Strategy Division in the Marine Corps Command, Control, Communication and Computers (C4) office, said reducing the monthly data and voice fees for even 50 percent of the current employees using BlackBerrys could mean as much as $5 million that the Marines could transfer to readiness and operations and maintenance accounts.
March 13, 2014
There's some new spyware that's been infecting hundreds of government computers in Europe and the United States. Several security researchers and Western intelligence officers, according to Reuters believe the malware, called Turla, is from the Russian government. They also think it's inked to the same software used in a U.S. military breach in 2008.
Steve Grewal, the chief information security officer for the Department of Education, joins Federal News Radio for an online chat. View the archived chat now.
The Education Department's new security operations center reached initial operations capability in 2013 featuring six tools to improve the protection of its network and data. Steve Grewal, Education's chief information security officer, said a move to cloud and mobile computing requires the agency to have more visibility and accountability into how vendors protect its network.
March 6, 2014
Chinese President Xi Jinping, according to the Associated Press, "has put himself in charge of a new body to coordinate cyber security, in a sign of Beijing's concern over its vulnerability to online attacks and its desire to retain tight control over the Internet." AP says Chinese state media reports the central Internet security and information leading group will draft policy for boosting the country's defenses, as well as expanding and improving Internet access.
The Mt. Gox bitcoin exchange in Tokyo filed for bankruptcy protection Friday and its chief executive said 850,000 bitcoins, worth several hundred million dollars, are unaccounted for. The exchange's CEO Mark Karpeles appeared before Japanese TV news cameras, bowing deeply. He said a weakness in the exchange's systems was behind a massive loss of the virtual currency involving 750,000 bitcoins from users and 100,000 of the company's own bitcoins. That would amount to about $425 million.
In this week's edition of Inside the Reporter's Notebook: Another senior technology official at DHS is on the move; HUD quietly extended the HITS contracts to Lockheed Martin and HP Enterprise Services; Defense CIO Teri Takai doesn't have a lot of good things to say about the Federal Information Technology Acquisition Reform Act and a new DHS office will raise the level of focus on critical infrastructure security.
Agencies must use only cloud services that have been approved under the Federal Risk Authorization and Management Program (FedRAMP) by June. OMB will receive more details on agency progress with the latest quarterly update through PortfolioStat. Meanwhile, FedRAMP's security baseline will be revised this summer.
Randy Wood, federal vice president of F5 Networks will discuss how Software Defined Application Services or SDAS, can benefit your agency.
February 25, 2014
Navy Cyber Forces, already headquartered in Suffolk, Va., will take over responsibility for building the knowledge workforce the Navy terms the "information dominance corps."
Departments have a week to finalize their plans to implement information security continuous monitoring by 2017. State and DHS already are heading down the new cyber path, and are excited to take advantage of the standard suite of products and services under the CDM contract.
Emile Monette, senior advisor for Cybersecurity for GSA's Office of Mission Assurance, and Carter Schoenberg, director of Cyber Security Services at CALIBRE systems, join host John Gilroy to talk about how to use the acquisition process to improve cybersecurity at your agency.
February 18, 2014
Maryland officials have signed an agreement with the National Institute of Standards and Technology to more clearly define the development of the National Cybersecurity Center of Excellence in the state.
U.S. banks and retail groups say they are joining forces to work on cyber security, getting past recent finger pointing for data breaches. The Financial Services Roundtable, Retail Industry Leaders Association and several other trade associations said the new partnership would focus on sharing more information on cyber threats.