Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Cybersecurity
Listen Tuesday August 19th @ 12pm
Todd Weller of Hexis Cyber discusses the types of security threats federal agencies are facing on this week's Federal Tech Talk radio show.
Terry Halvorsen, DoD's acting chief information officer, is planning to change the way the military uses and manages its network. The Joint Information Environment is driving many of the modernization efforts across DoD.
A large chunk of the government IT workforce that's charged with implementing the Homeland Security Department's new continuous diagnostics and mitigation initiative still doesn't know much about it. The lack of awareness is most acute with agency inspectors general. But those that have pressed forward with CDM say their networks have already become more secure or less costly.
Executive Editor Jason Miller looks at the news and information you may have missed or that slipped through the cracks at conferences, hearings and the like.
Tags: Jason Miller , Inside the Reporters Notebook , DHS , VA , GSA , HHS , DoT , cybersecurity , acquisition , technology , contracting , Buyers Club , T4 , Stan Lowe , Maria Roat , Charles De Sanno , Jenny Menna , Matt Goodrich , Bobbie Stempfley
Back in 2012, then-defense secretary Leon Panetta warned of a catastrophic cyber attack that could cripple an entire nation or its military. He called it a cyber Pearl Harbor. It was emblematic of a lot of the conventional wisdom that's built up around cyber warfare over the past decade or so. In a recent op-ed, Jay Healey challenges some of that conventional wisdom. Healy is director of Cyber Statecraft Initiative at the Atlantic Council. On In Depth with guest host Jared Serbu, he argued not only is deterrence possible in cyberspace, it's been a reality for a couple decades now.
Quite a number of insider threat incidents have happened because basic security principles were absent, overlooked or ignored. Why Jim Henderson says it's time we get back to the basics.
With 50 billion devices connected to the Internet, the rules of cybersecurity are changing. Agencies and more companies are on to the importance of cybersecurity, but they might be watching out for high-profile threats rather than more common and stealthy problems that can do lots of damage. That's what Cisco has found and will release in a report. Levi Gundert is the technical lead for Cisco's Threat Research, Analysis and Communications, or TRAC. He spoke with Tom Temin and Emily Kopp on the Federal Drive.
Federal employees are a prime target for hackers and other bad guys when on vacation. Learn 12 tips for keeping you and your federal-issued laptop safe while out of the office this summer.
Federal employees are prime targets for hackers. If not properly secured, the computers and mobile devices they carry could open up their agency's network to malicious attacks. Devices can be especially vulnerable when you're on vacation and it's easy to let your guard down. Jerry Irvine is the chief information officer and a partner of Prescient Solutions. He told Tom Temin and Emily Kopp on the Federal Drive what feds should be aware of when they're traveling.