Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Cybersecurity
The Pentagon plans to more than triple its cybersecurity staff in the next few years to defend against Internet attacks that threaten national security, Defense Secretary Chuck Hagel said. By 2016, the Pentagon should have 6,000 cyber professionals.
In this week's Inside the Reporter's Notebook, Executive Editor Jason Miller explores how DoD is developing its cloud security standards and Treasury is filling a financial management void.
Tags: Teri Takai , FedRAMP , GSA , DoD , Keith Alexander , Edward Snowden , cloud , cybersecurity , Mike Rogers , Robert Work , Treasury , Mark Reger , Danny Werfel , Norman Dong , OMB , Anne Rung , Dennis VanderTuig , Dan Gordon , OFPP , Lesley Field , Jason Miller , Inside the Reporters Notebook
The National Initiative for Cybersecurity Education (NICE) is trying to promote cyber skills across several disciplines.
The Pentagon will complete the Joint Regional Security Stacks in the European theater by the end of this year, two years earlier than planned. DoD already has begun to construct this regional cyber approach in the U.S. as part of its Joint Information Environment program.
Federal officials say they need help from Congress to ensure companies are protected under the law for sharing cyber information with the government. Officials also say building up the cyber workforce is a top concern.
Financial advisor Arthur Stein will answer your calls and emails about the TSP. Also, Nicole Blake Johnson and Andy Medici of the Federal Times will discuss a possible downsizing of the U.S. Postal Service.
March 26, 2014
As agencies strive to make legacy applications available on any device, NIST is providing help by developing metrics and focusing on portability.
Congress will try again this session on cybersecurity legislation, but some of the problems that prevented it from passing the last several years are back again. Sen. Tom Carper (D-Del.), chairman of the Senate Homeland Security and Governmental Affairs Committee, talked to In Depth with Francis Rose about cyber legislation in his office on Capitol Hill today. He says the landscape looks a little different for the legislation this time around.
The "white hats" can never let up in the drive to stay ahead of cyber mischief makers. The Cyber Security Research Alliance recently announced its teaming up with Drexel and George Mason University to research some of the big cyber and physical security problems in the country. Lee Holcomb, president of the alliance and deputy of Technical Operations at Lockheed Martin's Information Systems and Global Solutions, spoke with Federal Drive hosts Tom Temin and Emily Kopp, about the work the group is doing. Lockheed Martin is a founding member of CSRA.
Data breaches happen in both the private and public sector. The latest victims include the IRS, Veteran Affairs and Target. So, whom do you call when your agency is under attack? The Secret Service might not initially come to mind, but it has a long history of protecting the nation's financial infrastructure from threats. Bill Noonan, the deputy special agent in charge of cyber operations for the Secret Service, recently testified before the Senate Judiciary Committee about the agency's experience in the cyber arena. He joined Federal Drive hosts Tom Temin and Emily Kopp to further discuss the agency's role in cyber.