Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Dan Chenok, executive director of the IBM Center for the Business of Governor will talk about a survey conducted by the center.
October 9, 2012
The agency made awards to AT&T and Verizon for more than 1,000 Apple and Samsung handheld and tablet computers. DISA also wants for industry to develop a mobile device Common Access Card-enabled virtual thin client.
Procurement will start with management of 5,000 mobile devices, plus app stores for consumers inside and outside of VA. The agency awarded a three-year, $9.3 million deal to Longview International Technology Solutions to build and manage the technology in the cloud.
Dr. Emma Garrison-Alexander, TSA's chief information officer, said the goal is to make sure employees have the right device to match up with their mission requirements.
September 20, 2012
Ojas Rege, vice president of Strategy for MobileIron, joins host John Gilroy to talk about how his company can help you manage a wide variety of mobile devices.
September 11, 2012
Horace Blackman, CIO and director of IT support services at the Veterans Affairs Department Central Office talks about how mobile devices are handled at his agency.
September 4, 2012
McAfee says Android devices are the most vulnerable. Twitter has become one of the major threat vectors.
Agencies have taken the first steps in building a more digital-friendly government. As part of the far-reaching digital services strategy released in May, most large federal agencies have identified services and resources that could benefit from a digital overhaul.
Agencies considering allowing employees to use their own smartphones and other mobile devices on the job - known as bring-your-own-device (BYOD) - have a new toolkit at their disposal to ease the transition. The toolkit contains key considerations for agency IT managers, success stories from agencies that have already implemented such programs as well as sample existing policies at those agencies to serve as samples.
This week the Army exceeded 500,000 users on its enterprise email network. The migration of potentially 3.7 million users to the network should be completed by March 2013. The Defense Department's move to a single, cloud-based system run by the Defense Information Systems Agency sets the stage for other enterprise-wide systems, said John Hale, DISA's chief of enterprise applications, in an interview with Federal News Radio's Jared Serbu and Jason Miller.
Since March 2010, the device has helped to catch 450 drug traffickers, weapons smugglers and potential terror suspects. The developers of the technology are finalists for the 2012 Service to America Medal.
Michael Isman, vice president of Booz Allen Hamilton, says agencies adopting a bring-your-own- device strategy should do so as part of their larger digital strategy.
F-Secure analyzed 19 new families of mobile malware. It found a big increase in products that target Android.
New mobile application helps military personnel and veterans undergoing post-traumatic stress disorder treatment to relieve stress and work through traumatic memories.
The agency spends thousands of dollars per user on computers for contractors and task force officers. ATF's chief information officer said those individuals could easily use their own devices to access virtual desktops that provide the same functionality.
New guidelines could help agencies adopting bring-your-own-device strategies manage the potential risks smartphones and tablets could pose.
The FBI wants an automated testing system that can handle all Android applications. Researchers are trying to standardize a technique called fuzzing that forces outside data into the apps to find weaknesses.
Christopher Fountain, senior vice president of SecureInfo joins host John Gilroy to talk about IT security.
July 10, 2012
The agency will hold a workshop July 25 to review the second draft of FIPS 201-2.
Early-adopter agencies of the bring-your-own-device idea are blazing their own trail through the security, privacy and policy challenges of personally-owned devices on government networks.