Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
In an effort to provide a better environment for commenting, we have changed our comment platform. In order to comment on a story, you will first need to create a Disqus account if you do not already have one. It's easy! Sign up for an account below by clicking in the "Leave a message" field and then clicking on the blue Disqus icon. Alternatively, you can now comment using your Facebook, Twitter or Google accounts.
Federal News Radio understands how important anonymity is to some commenters. Like our previous platform, our new system allows users to identify their comments with a screen name (instead of their first and last name) if they so choose. Find more information about creating a screen name and other frequently asked questions about Disqus here.
Our comment policy itself has not changed. Federal News Radio encourages users to express their opinions by posting comments that have a positive and constructive tone; are on topic, clear and to-the-point; and are respectful towards others and their opinions. Our goal is to maintain a civil dialogue in which readers feel comfortable. Federal News Radio reserves the right to remove comments and block users that do not follow these criteria.comments powered by Disqus
Report: Government's own 'white-hat' hackers give HealthCare.gov mixed review on security
Three million dollars in federal grants will go to four national mobile communications companies to figure out a way to get rid of passwords. The grants come from the Commerce Department's National Strategy for Trusted Identities in Cyberspace program, or NSTIC. The goal of NSTIC is to give consumers better security options with their mobile and online transactions. Commerce hopes that funding research to get rid of passwords will eventually minimize the risk of identity theft.
Marilyn Tavenner, the Centers for Medicare and Medicaid Services administrator, promised House lawmakers Thursday that the site would be better protected when open enrollment begins in two months. The recent attack on the HealthCare.gov didn't succeed in stealing any data, DHS says. But some lawmakers say a year into the Affordable Care Act, the website still has basic cybersecurity challenges that should have been fixed.
Senate investigation says China hacked into military contractor networks at least 9 times
Ronald Pontius, the deputy to the commander of Army Cyber Command, said over the next few years the Army will give cyber workers their own career field, preliminarily known as Career Field 17.
The Army and Air Force are using a shared network security infrastructure at Joint Base San Antonio as of Sept. 14. It's a major step toward the Defense Department's goal of moving base-level cybersecurity operations to a more defensible, centrally-managed architecture.
The Army's new dedicated career branch for cyber specialties could be up and running as soon as October.
The Army has a request for information out to see how it can introduce 4G LTE mobile technology to soldiers on the battlefield. The Army wants to see how 4G can help with battlefield intelligence and communication, and keep those capabilities on a wireless network. It hopes the technology can be tailored to help individual soldiers interact and contribute to the battlefield network. The Army wants the network to support video, voice and text communications. Responses to the ROI are due on October 6th.
Despite news to the contrary, the Homeland Security Department has not picked a vendor to provide the CDM dashboard. This post is part of Jason Miller's Inside the Reporter's Notebook feature.
Hackers break into HealthCare.gov but officials say no consumer data compromised
Both the Army and Air National Guard say they are making inroads toward gaining a foothold for their state-based forces in the Defense Department's growing mission sets in cyberspace. Both services say they are training more personnel and building the guard's credibility within the Pentagon when it comes to cyber missions.
Former GSA official Dave McClure left government in June and now is an executive at the Veris Group.
It seems like the whole world is going mobile, and that includes the federal government. Agencies are using more and more apps for collaboration and productivity. But some apps increase the potential for exposing government data. To help you guard against these security risks, the National Institute of Standards and Technology is providing tips to the federal community for vetting third-party apps. Computer Scientist, Tom Karygiannis, joined Tom Temin on the Federal Drive to discuss the guidelines.
Chris LaPoint, vice president of Product Management for SolarWinds will discuss how his company can help your agency manage its information technology system.
August 26, 2014
The Defense Information Systems Agency will begin to shake up its organizational chart in significant ways beginning on Oct. 1. But officials, so far, are reluctant to discuss the details.
New details emerge about the cyber attack against USIS. Hackers accessed personal information of Department of Homeland Security workers, including Social Security numbers, dates of birth and addresses. DHS will offer credit monitoring services to the affected employees.
Official says breach at security clearance contractor affects up to 25,000 federal workers
Citing threats from hackers, US won't release security details for federal health care website
The Defense Information Systems Agency, which serves as the broker between Defense Department components and commercial providers of cloud computing services, says the certification standards it set for commercial providers may be too arduous for vendors. DoD also launched five pilots to test the use of commercial cloud providers and is reassessing how it develops cloud requirements.
The National Security Agency closed down an office dedicated to mobility, because devices and apps have become part of the fabric of everything the agency does. But NSA, like all agencies, still must figure out how to secure mobile devices using derived credentials.