Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
A new Federal News Radio survey of federal chief information officers and deputy CIOs found cyber above all else is the top priority. Charlie Armstrong, the CIO for Customs and Border Protection, said his focus is to protect the data first and foremost and his systems a very close second.
The Government Printing Office became the first legislative branch agency to put its email in the cloud. CIO Chuck Riddle said once that effort is completed, GPO will move other functions into the cloud.
The White House wants the government to lead a nationwide effort to reduce identity theft and fraud. More secure government credit cards and multi-factor authentication for federal websites dealing with sensitive citizen data are two ways to do that.
The Office of Management and Budget is pushing back against the recent critical report on federal cloud computing efforts by 19 civilian agency inspectors general.
In fiscal 2015 FISMA guidance, OMB is trying to close a big hole exposed during the government's reaction to the Heartbleed vulnerability. The White House is giving DHS the authority to regularly conduct proactive scans of certain civilian agency networks. DHS made it clear to Congress earlier this year the delay in getting permission from agencies to scan their networks cost them days in response time during Heartbleed.
The goal of the scorecard or dashboard would be to give government leaders a better sense of just how secure agency networks are from hackers. As the 11th annual National Cybersecurity Awareness Month begins, DHS is doing much less education about why securing computers and networks is important.
Report: Government's own 'white-hat' hackers give HealthCare.gov mixed review on security
Three million dollars in federal grants will go to four national mobile communications companies to figure out a way to get rid of passwords. The grants come from the Commerce Department's National Strategy for Trusted Identities in Cyberspace program, or NSTIC. The goal of NSTIC is to give consumers better security options with their mobile and online transactions. Commerce hopes that funding research to get rid of passwords will eventually minimize the risk of identity theft.
Marilyn Tavenner, the Centers for Medicare and Medicaid Services administrator, promised House lawmakers Thursday that the site would be better protected when open enrollment begins in two months. The recent attack on the HealthCare.gov didn't succeed in stealing any data, DHS says. But some lawmakers say a year into the Affordable Care Act, the website still has basic cybersecurity challenges that should have been fixed.
Senate investigation says China hacked into military contractor networks at least 9 times
Ronald Pontius, the deputy to the commander of Army Cyber Command, said over the next few years the Army will give cyber workers their own career field, preliminarily known as Career Field 17.
The Army and Air Force are using a shared network security infrastructure at Joint Base San Antonio as of Sept. 14. It's a major step toward the Defense Department's goal of moving base-level cybersecurity operations to a more defensible, centrally-managed architecture.
The Army's new dedicated career branch for cyber specialties could be up and running as soon as October.
The Army has a request for information out to see how it can introduce 4G LTE mobile technology to soldiers on the battlefield. The Army wants to see how 4G can help with battlefield intelligence and communication, and keep those capabilities on a wireless network. It hopes the technology can be tailored to help individual soldiers interact and contribute to the battlefield network. The Army wants the network to support video, voice and text communications. Responses to the ROI are due on October 6th.
Despite news to the contrary, the Homeland Security Department has not picked a vendor to provide the CDM dashboard. This post is part of Jason Miller's Inside the Reporter's Notebook feature.
Hackers break into HealthCare.gov but officials say no consumer data compromised
Both the Army and Air National Guard say they are making inroads toward gaining a foothold for their state-based forces in the Defense Department's growing mission sets in cyberspace. Both services say they are training more personnel and building the guard's credibility within the Pentagon when it comes to cyber missions.
Former GSA official Dave McClure left government in June and now is an executive at the Veris Group.
It seems like the whole world is going mobile, and that includes the federal government. Agencies are using more and more apps for collaboration and productivity. But some apps increase the potential for exposing government data. To help you guard against these security risks, the National Institute of Standards and Technology is providing tips to the federal community for vetting third-party apps. Computer Scientist, Tom Karygiannis, joined Tom Temin on the Federal Drive to discuss the guidelines.
Chris LaPoint, vice president of Product Management for SolarWinds will discuss how his company can help your agency manage its information technology system.
August 26, 2014