Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Cybersecurity
The United States and South Korea have started the first in a series of large-scale naval exercises off Japan and the Korean Peninsula despite objections from China. What could possibly go wrong?
Man-in-the-browser attacks threaten government systems too, FCC wants comments on cyber policy
This week, Federal Security Spotlight presents highlight of a speech given by Bruce McConnell, senior advisor to the director of the National Programs and Protection Directorate of the Homeland Security Department.
Aug. 12, 2010
Qwest says "By offering the next-generation security that is baked into dedicated IPv6 addressing, Qwest is doing its part to provide government and business customers with the most advanced Internet security that is available." More from CTO Pieter Poll.
Think you can either be sustainable or secure, but you can't be both? Oh nay nay! says GSA's Ed O'Hare.
The OTA Awards program recognizes exceptional and meritorious achievements by companies, non-governmental agencies (NGO) and individuals who demonstrate commitment to preserving and improving online safety for consumers, business and government services. We get more about the how and why from Craig Spiezle with the Online Trust Alliance.
Group tries to build trust in cyberspace, Thumbs up for cyber coordination
White House cyber coordinator says using secure identity cards and working more closely with industry among his top short term priorities. He says a new strategy to secure online transactions also is on track for the President's signature this fall. And he's closely watching Capitol Hill as Senate lawmakers may be close to completing draft of consolidated cyber bill.
Tags: technology , Howard Schmidt , Harry Reid , White House , Information Security and Privacy Advisory Board , cybersecurity , HSPD-12 , secure identity management , National Strategy for Trusted Identities in Cybers , Jason Miller
Learn more in today's cybersecurity update.