Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Cybersecurity
NIST led the year-long effort to develop the Framework for Improving Critical Infrastructure Cybersecurity. Agencies now must review regulations to ensure alignment with the framework. DHS also launches a new voluntary program that will offer access to a variety of federal resources to help companies improve cybersecurity.
Government officials, associations and companies are offering insight and comments on the recently released White House cyber framework.
Phyllis Schneck, the deputy undersecretary for cybersecurity in the National Protection and Programs Directorate at DHS, said the department's goal is to further the trust relationship with industry around sharing and understanding cybersecurity threats.
February 6, 2014
The goal is to more accurately evaluate the security of the government's computer networks and systems. These efforts could bring more consistency to the cyber auditing process and engender more confidence in its results.
Tags: technology , cybersecurity , oversight , Kathleen Tighe , Education Department , Ron Ross , NIST , Alan Paller , SANS Institute , council of the inspectors general on integrity and and efficiency , Jason Miller
The inconsistent way inspectors general review the security of federal networks and computers is causing uncertainty around what is working and what isn't in the federal government. A recent State Department IG management alert is a prime example of this growing disconnect.
Emerging technologies like cloud, wireless access and virtualization are making telework an easy -- and economic -- solution for some agencies.
Tags: Brian McGrath , George Jakabcin , A New Era in Technology , telework , mobile , technology , cybersecurity , Virtualization , In Depth , Federal Drive , Michael OConnell , Census Bureau , TIGTA , cloud
Federal News Radio surveyed more than a dozen current and former federal officials about what technology and acquisition stories stood out last year.
The Defense Information Systems Agency says an eventual commercial cloud buy probably won't be bundled into a single contract vehicle, but in the meantime, DoD needs to work through challenges involving security, approval policy and network operations.
A new white paper from SafeGov recommended ways for agencies to move to an integrated cloud and cyber approach and away from one that is fragmented and ad hoc in many respects. Karen Evans, a co-author of the report and a former Office of Management and Budget administrator for e-government and IT, said agencies need a clearer picture of how this integration could happen.
HealthCare.gov was like other failed systems, the result of boiling a toxic stew of poorly defined requirements, the wrong contractor, insufficient oversight and unclear lines of authority.