Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Cybersecurity
In this week's Inside the Reporter's Notebook, Executive Editor Jason Miller explores how DoD is developing its cloud security standards and Treasury is filling a financial management void.
Tags: Teri Takai , FedRAMP , GSA , DoD , Keith Alexander , Edward Snowden , cloud , cybersecurity , Mike Rogers , Robert Work , Treasury , Mark Reger , Danny Werfel , Norman Dong , OMB , Anne Rung , Dennis VanderTuig , Dan Gordon , OFPP , Lesley Field , Jason Miller , Inside the Reporters Notebook
The National Initiative for Cybersecurity Education (NICE) is trying to promote cyber skills across several disciplines.
The Pentagon will complete the Joint Regional Security Stacks in the European theater by the end of this year, two years earlier than planned. DoD already has begun to construct this regional cyber approach in the U.S. as part of its Joint Information Environment program.
Federal officials say they need help from Congress to ensure companies are protected under the law for sharing cyber information with the government. Officials also say building up the cyber workforce is a top concern.
Financial advisor Arthur Stein will answer your calls and emails about the TSP. Also, Nicole Blake Johnson and Andy Medici of the Federal Times will discuss a possible downsizing of the U.S. Postal Service.
March 26, 2014
As agencies strive to make legacy applications available on any device, NIST is providing help by developing metrics and focusing on portability.
Congress will try again this session on cybersecurity legislation, but some of the problems that prevented it from passing the last several years are back again. Sen. Tom Carper (D-Del.), chairman of the Senate Homeland Security and Governmental Affairs Committee, talked to In Depth with Francis Rose about cyber legislation in his office on Capitol Hill today. He says the landscape looks a little different for the legislation this time around.
The "white hats" can never let up in the drive to stay ahead of cyber mischief makers. The Cyber Security Research Alliance recently announced its teaming up with Drexel and George Mason University to research some of the big cyber and physical security problems in the country. Lee Holcomb, president of the alliance and deputy of Technical Operations at Lockheed Martin's Information Systems and Global Solutions, spoke with Federal Drive hosts Tom Temin and Emily Kopp, about the work the group is doing. Lockheed Martin is a founding member of CSRA.
Data breaches happen in both the private and public sector. The latest victims include the IRS, Veteran Affairs and Target. So, whom do you call when your agency is under attack? The Secret Service might not initially come to mind, but it has a long history of protecting the nation's financial infrastructure from threats. Bill Noonan, the deputy special agent in charge of cyber operations for the Secret Service, recently testified before the Senate Judiciary Committee about the agency's experience in the cyber arena. He joined Federal Drive hosts Tom Temin and Emily Kopp to further discuss the agency's role in cyber.
California Attorney General Kamala Harris says her state has become a major U.S. target of cyber-crimes committed by outlaw groups with ties to Eastern Europe, China and Africa. As part of a broader report on international organized crime groups, Harris said about 17 percent of attempts to hack into major computer networks in the United States in 2012 were aimed at California.