Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: Cybersecurity
The Science and Technology Directorate issued a Broad Agency Announcement and four specific solicitations to get industry, academia and others thinking about how to improve cybersecurity. Over the next nine months, the agency will review white papers, proposals and make awards, with expectations of the development of commercial or open source projects in the next year or two.
Lt. Gen. Robert Ferrell, the Army's CIO/G6, said the service now is requiring all enterprise software titles to be modernized, virtualized and migrated to an approved data center.
A new report from the Government Accountability Office suggests the Department of Homeland Security and the Office of Management and Budget need to take a more active role in monitoring and guiding small agencies when it comes to their security and privacy-protection programs.
The nomination of Shaun Donovan to be director of the Office of Management and Budget as well as a variety of bills dealing with federal IT reform and cybersecurity updates crowded the docket of the Senate Homeland Security and Government Affairs Committee business meeting Wednesday.
Tags: technology , congress , OMB , Shaun Donovan , Tom Carper , Tom Coburn , IT reform , cybersecurity , Senate Homeland Security and Governmental Affairs Committee , Beth Cobert , Mark Forman , TASC , Erica McCann , Daniel Castro , Jason Miller
The Justice Department has rewritten the playbook on catching cyber criminals. It recently led an international effort to disrupt a global cybertheft ring. A Russian-led gang allegedly stole millions of dollars by infecting computers with malware known as Gameover Zeus. Robert Anderson is the executive assistant director of the Criminal, Cyber Response and Services Branch at the FBI. He joined Tom Temin and Emily Kopp on the Federal Drive to discuss how the sting operation worked.
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities. Senate lawmakers prepare to mark-up IT reform bill next week. CIO's spend time at camp where OMB and others emphasize the word of the year: effectiveness.
Tags: technology , DATA Act , financial management , A-11 , OMB , Senate Homeland and Governmental Affairs Committee , FITARA , FISMA , cybersecurity , Steve VanRoekel , Tom Carper , Tom Coburn , budget , security clearances , ODNI , Jason Miller , Inside the Reporters Notebook
The Senate Homeland Security and Governmental Affairs Committee members will introduce and markup the Federal Information Security Modernization Act of 2014 Wednesday. The bill would require OMB to rescind a major section of Circular A-130 in order to fix long-standing complaints with FISMA's reauthorization requirements.
The Homeland Security Department will channel its efforts into battling terrorism, cyber threats and natural disasters, according to a quadrennial review the agency released Wednesday.
As government agencies migrate to cloud computing and other new technologies, the information technology workforce requirements are changing.
Michael Daniel, the Obama administration's cybersecurity coordinator, says he wants to dismantle the most common method of cyber protection: passwords. Even as cyber threats continue to grow more sophisticated and destructive, passwords are weakening and proving easier to crack than ever. The solution lies in the National Strategy for Trusted Identities in Cyberspace (NSTIC), which calls for a broad "identity ecosystem" to replace simple passwords.