Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Search Tags: CSIS
A recent report by the Center for Strategic and International Studies shows agencies are behind
Tim Hoechst, Chief Technology Officer at Agilex, has been thinking about technological innovation and diffusion. You should too.
With so much at stake, what role, if any does the federal government play in protecting the .com Internet domain? Several experts offer some candid observations on what the government's role should be.
A provision in the Commerce, Justice, State appropriations bill could give NIST a larger role in protecting federal and civilian computer networks. The plan is from one influential Maryland lawmaker, who believes the battle for cybersecurity needs to be fought in the Free State.
Microsoft issues temporary fix for Windows Shell zero-day
In a staggering statement yesterday the head of Canada's intelligence agency said says it suspects that cabinet ministers in two Canadian provinces are under the control of foreign nations. The Canadian Security Intelligence Service (CSIS) also said China and countries in the Middle East may be the culprits. Director Richard Fadden said on Canadian TV politicians in British Columbia may be under the influence of foreign governments and are not aware they are being used.
The House Cybersecurity Caucus says new provisions "will establish strong, centralized oversight to protect our nation's critical information infrastructure and update our comprehensive policy for operating in cyberspace." But will they? We ask Jim Lewis with CSIS
Gen. Keith Alexander calls for the Cyber Command to have real time understanding of what's going on in their computer networks. He also calls for a common operational picture as a part of improving situational awareness. Alexander also says DoD is putting a lot of effort and focus on ensuring privacy and civil liberties laws and regulations are followed.
FIVE events during the fall of 2009 thrust concerns over "homegrown" terrorism—or extremist violence perpetrated by U.S. legal residents and citizens—into public view. A new CSIS report examines these five cases, situating them within the context of recent U.S. efforts to address domestic radicalization.
U.S. Secretary of State Hillary Rodham Clinton said Monday Iran is sliding into a military dictatorship, a new assessment suggesting a rockier road ahead for U.S.-led efforts to stop Tehran from obtaining a nuclear weapon.