Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
In an effort to provide a better environment for commenting, we have changed our comment platform. In order to comment on a story, you will first need to create a Disqus account if you do not already have one. It's easy! Sign up for an account below by clicking in the "Leave a message" field and then clicking on the blue Disqus icon. Alternatively, you can now comment using your Facebook, Twitter or Google accounts.
Federal News Radio understands how important anonymity is to some commenters. Like our previous platform, our new system allows users to identify their comments with a screen name (instead of their first and last name) if they so choose. Find more information about creating a screen name and other frequently asked questions about Disqus here.
Our comment policy itself has not changed. Federal News Radio encourages users to express their opinions by posting comments that have a positive and constructive tone; are on topic, clear and to-the-point; and are respectful towards others and their opinions. Our goal is to maintain a civil dialogue in which readers feel comfortable. Federal News Radio reserves the right to remove comments and block users that do not follow these criteria.comments powered by Disqus
Citing threats from hackers, US won't release security details for federal health care website
The Defense Information Systems Agency, which serves as the broker between Defense Department components and commercial providers of cloud computing services, says the certification standards it set for commercial providers may be too arduous for vendors. DoD also launched five pilots to test the use of commercial cloud providers and is reassessing how it develops cloud requirements.
The National Security Agency closed down an office dedicated to mobility, because devices and apps have become part of the fabric of everything the agency does. But NSA, like all agencies, still must figure out how to secure mobile devices using derived credentials.
The service will test out a role-based authentication technology on an application in the MilCloud run by DISA. Frank Konieczny, the Air Force's chief technology officer, said the pilot could move into full production in six months. DoD is considering adding the role-based capability to the JIE framework.
The Army has thousands of personnel working full-time on cyber, but so far, those soldiers have no dedicated career path. That may be about to change.
Terry Halvorsen, DoD's acting chief information officer, is planning to change the way the military uses and manages its network. The Joint Information Environment is driving many of the modernization efforts across DoD.
A large chunk of the government IT workforce that's charged with implementing the Homeland Security Department's new continuous diagnostics and mitigation initiative still doesn't know much about it. The lack of awareness is most acute with agency inspectors general. But those that have pressed forward with CDM say their networks have already become more secure or less costly.
Quite a number of insider threat incidents have happened because basic security principles were absent, overlooked or ignored. Why Jim Henderson says it's time we get back to the basics.
With 50 billion devices connected to the Internet, the rules of cybersecurity are changing. Agencies and more companies are on to the importance of cybersecurity, but they might be watching out for high-profile threats rather than more common and stealthy problems that can do lots of damage. That's what Cisco has found and will release in a report. Levi Gundert is the technical lead for Cisco's Threat Research, Analysis and Communications, or TRAC. He spoke with Tom Temin and Emily Kopp on the Federal Drive.
Federal websites will have to become more secure if Congress gets its way. Under a bill recently passed by the House, any new federal websites that collect personally identifiable information will need to be deemed secure by the agency's chief information officer before they go live to the public.
Federal employees are a prime target for hackers and other bad guys when on vacation. Learn 12 tips for keeping you and your federal-issued laptop safe while out of the office this summer.
Federal employees are prime targets for hackers. If not properly secured, the computers and mobile devices they carry could open up their agency's network to malicious attacks. Devices can be especially vulnerable when you're on vacation and it's easy to let your guard down. Jerry Irvine is the chief information officer and a partner of Prescient Solutions. He told Tom Temin and Emily Kopp on the Federal Drive what feds should be aware of when they're traveling.
This fall, five more schools will offer an intensive science, technology, engineering and math (STEM) education track to students who are serious about federal cybersecurity careers. These Centers of Academic Excellence are overseen jointly by the National Security Agency and the Homeland Security Department. Schools have to pass a meticulous screening process to qualify for the program. Steve LaFountain is dean of the NSA's College of Cyber. He joined Tom Temin and Emily Kopp on the Federal Drive to discuss the new move.
The National Association of Corporate Directors' (NACD) Handbook on Cyber-Risk Oversight, introduced Tuesday at the National Press Club in Washington, outlines five key principles that aim to move forward the collaborative cybersecurity effort.
The cyber attacks on small federal agencies demonstrate the cyber domain is an ecosystem, and the federal government is one of many different cyber cultures. One expert says a map of the different cultures can help agencies prevent cyber attacks. Ben Fitzgerald is senior fellow and director of the Technology and National Security Program at the Center for a New American Security. He explained that and other cybersecurity strategies on In Depth with Francis Rose.
Chief legal counselor to NSA says intelligence disclosures may have set back efforts to improve nation's cybersecurity posture because of increasing unease about public-private cooperation, and that it's time to reexamine the digital privacy trust relationship between government and the public.
Larry Zelvin is stepping down as the director of DHS's National Cyber and Communications Integration Center (NCIC) next month after almost 30 years of government service.
Inside the DoD Reporter's Notebook: DoD releases missing piece of 2015 budget; defense acquisition 'good enough'
The Defense Department's request for its overseas contingency operations is about $20 billion less than initial estimates. Former Defense officials say realistic goals and managed expectations usually spelled success for weapons systems.
The Science and Technology Directorate issued a Broad Agency Announcement and four specific solicitations to get industry, academia and others thinking about how to improve cybersecurity. Over the next nine months, the agency will review white papers, proposals and make awards, with expectations of the development of commercial or open source projects in the next year or two.
The Homeland Security Department will channel its efforts into battling terrorism, cyber threats and natural disasters, according to a quadrennial review the agency released Wednesday.