Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
Companies planning to bring aboard some new staff should rethink their secret use of social networking Web sites, like Facebook, to screen new recruits. William Stoughton of North Carolina State University, lead author of a study published in Springer's Journal of Business and Psychology, indicated in his work this practice is viewed by some as a breach of privacy and could create a negative impression of the company for potential employees. This type of spying could even lead to law suits.
Budget cuts notwithstanding, the U.S. Air Force plans to add 1,000 new personnel between 2014 and 2016 as part of its cyber security units. The 24th Air Force at Joint Base San Antonio-Lackland, Texas is home to the U.S. Air Force cyber command. With a budget of about $1 billion and a staff of roughly 400 military and civilian personnel, the command oversees about 6,000 cyber defense personnel throughout the Air Force.
Federal News Radio surveyed more than a dozen current and former federal officials about what technology and acquisition stories stood out last year.
Documents obtained by Federal News Radio show VA's financial audit found material weaknesses, including the failure to remove terminated employees from accessing the network, and the lack of a formal process for monitoring, preventing installation and removing unauthorized application software on agency systems. House Veterans Affairs lawmakers continue to press VA to make changes to their cybersecurity posture more quickly. VA officials say they have a multi-layered defense to include outside network monitoring by external partners, active scanning of Web applications and source code, and protection of servers, workstations, network and gateways, among other security efforts.
Documents obtained by Federal News Radio show VA failed for the 15th year in a row its consolidated financial statement audit with regard to security controls.
Kevin Kelly, CEO of LGS Innovations, will discuss how his company can help improve network security at your agency.
December 17, 2013
You've heard of email and snail mail - but what about jail mail? It is something that will soon be on the way to some inmates at the Pasco County Jail in Florida. Sheriff Chris Nocco says 77 kiosks are being set up in the jail housing units. The set-ups will let inmates read and send email to those who have approved accounts. The sheriff says there will be no cost to taxpayers for the service. While inmates will be able to get email and photos, they will only be able to send email, not photos. And - as is the case with regular mail, deputies will be monitoring inmates email.
A longtime adviser to the U.S. Director of National Intelligence has resigned after the government learned he has worked since 2010 as a paid consultant for Huawei Technologies Ltd., the Chinese technology company the U.S. has condemned as an espionage threat. Theodore H. Moran, a professor at Georgetown University, had served since 2007 as adviser to the intelligence director's advisory panel on foreign investment in the United States. Moran also was an adviser to the National Intelligence Council, a group of 18 senior analysts and policy experts who provide U.S. spy agencies with judgments on important international issues.
An interagency review group determined having one leader for both organizations makes the most sense to get the mission done.
Bernie Mazer, the Interior Department's chief information officer, said among his top priorities are data center consolidation, cloud hosting, cybersecurity and strategic sourcing. He said the goal is to let the bureau level IT executives focus on mission and not worry about commodity IT.
December 12, 2013
Federal News Radio Executive Editor Jason Miller joins host Mark Amtower to talk about a number of Federal IT issues.
December 9, 2013
Inside the Reporter's Notebook: Labor pinched by poor cloud contracting; Financial shared services progresses
News and buzz in the acquisition and IT communities that you may have missed this week.
Director of the Defense Research Projects Agency Director Arati Prabhakar says DARPA's budget wasn't decimated by sequestration, but it is being slowly eroded. The Office of Naval Research and the Marine Corps team up for technology demonstration. John Moniz, ONR program manager, says marines on the front lines can get real-time data using smartphones. At the recent AFCEA Mobile Symposium, Defense Information Systems Agency officials talk about mobile security possibilities.
The Homeland Security Department's Office of Inspector General took a look at DHS' information security program and practices and found them lacking.
National Security Advisor Susan Rice has sent a strong message to the Chinese. During a speech at Georgetown University, she said, "Cyber-enabled economic espionage hurts China as well as the U.S., because American businesses are increasingly concerned about the costs of doing business in China." U.S. Intelligence officials have been sounding alarms about China's high tempo of economic espionage for more than a decade.
You've heard of Stuxnet --the destructive computer virus unleashed on Iran's nuclear facilities. It was believed to be the world's first cyber weapon. But now we're learning that it has a twin --and the twin actually came first and started eating away at Iran's nuclear facility at Natanz years before the more public version we learned about in 2010. The bad news for Iran's nuclear programmers is that it's not really clear how broad the Stuxnet family is.
CYPTOLOCKER is a type of Ransomware that restricts access to infected computers and requires victims to pay a ransom in order to rescue their computers from criminals who take them over. It's so sophisticated that one US police force was hit by the virus and forced to pay a ransom using a new virtual currency called bit coins. Pfishing emails --which look legitimate, with subject lines like "payroll or package delivery" are the usual method of delivery.
Every day it seems there's a new Cyber Security threat. Everything from ransom ware to zero day issues. Cyber security insurance has been the way that companies have tried to offset the risk of online attacks and data loss, but the insurers were missing the information they needed to convince potential clients to buy their products. But now threat intelligence is helping them gauge the risk that potential customers might encounter.
A pilot project is part of NSA's push to layer commercial technologies and standards on top of one another to achieve security goals more quickly. This approach would replace the government-specific IT solutions that can take years and millions of dollars to develop.
Former HHS Secretary Dr. Louis Sullivan will discuss the advances that have been made in healthcare interoperability with host John Gilroy.
November 26, 2013