Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Cybersecurity
The Pentagon will complete the Joint Regional Security Stacks in the European theater by the end of this year, two years earlier than planned. DoD already has begun to construct this regional cyber approach in the U.S. as part of its Joint Information Environment program.
Federal officials say they need help from Congress to ensure companies are protected under the law for sharing cyber information with the government. Officials also say building up the cyber workforce is a top concern.
Financial advisor Arthur Stein will answer your calls and emails about the TSP. Also, Nicole Blake Johnson and Andy Medici of the Federal Times will discuss a possible downsizing of the U.S. Postal Service.
March 26, 2014
As agencies strive to make legacy applications available on any device, NIST is providing help by developing metrics and focusing on portability.
Congress will try again this session on cybersecurity legislation, but some of the problems that prevented it from passing the last several years are back again. Sen. Tom Carper (D-Del.), chairman of the Senate Homeland Security and Governmental Affairs Committee, talked to In Depth with Francis Rose about cyber legislation in his office on Capitol Hill today. He says the landscape looks a little different for the legislation this time around.
The "white hats" can never let up in the drive to stay ahead of cyber mischief makers. The Cyber Security Research Alliance recently announced its teaming up with Drexel and George Mason University to research some of the big cyber and physical security problems in the country. Lee Holcomb, president of the alliance and deputy of Technical Operations at Lockheed Martin's Information Systems and Global Solutions, spoke with Federal Drive hosts Tom Temin and Emily Kopp, about the work the group is doing. Lockheed Martin is a founding member of CSRA.
Data breaches happen in both the private and public sector. The latest victims include the IRS, Veteran Affairs and Target. So, whom do you call when your agency is under attack? The Secret Service might not initially come to mind, but it has a long history of protecting the nation's financial infrastructure from threats. Bill Noonan, the deputy special agent in charge of cyber operations for the Secret Service, recently testified before the Senate Judiciary Committee about the agency's experience in the cyber arena. He joined Federal Drive hosts Tom Temin and Emily Kopp to further discuss the agency's role in cyber.
California Attorney General Kamala Harris says her state has become a major U.S. target of cyber-crimes committed by outlaw groups with ties to Eastern Europe, China and Africa. As part of a broader report on international organized crime groups, Harris said about 17 percent of attempts to hack into major computer networks in the United States in 2012 were aimed at California.
Microsoft, is admitting it searched emails in a blogger's Hotmail account to track down who was leaking company secrets. John Frank, deputy general counsel for Microsoft, which owns Hotmail, said in a statement the software company ``took extraordinary actions in this case.'' But, In the future, he said, Microsoft would consult an outside attorney who is a former judge to determine if a court order would have allowed such a search.
GSA awarded a $47.3 million contract to Metrica Team Venture to provide software and services under the continuous diagnostics and mitigation program. DHS expects the dashboard to offer a more insightful view of the cyber health of agency networks starting this fall.
Tags: technology , cybersecurity , DHS , GSA , Jeff Eisensmith , Energy Department , Bob Brese , Jim Piche , continuous monitoring , Metrica Team Venture , industry , contracting , FedInsider , ImmixGroup , Jason Miller