Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Cybersecurity
The National Security Agency closed down an office dedicated to mobility, because devices and apps have become part of the fabric of everything the agency does. But NSA, like all agencies, still must figure out how to secure mobile devices using derived credentials.
Labor Department Deputy CIO Dawn Leaf joins Federal News Radio for an online chat to discuss her priorities around IT modernization, data center consolidation and cybersecurity.
Listen Tuesday August 19th @ 12pm
Todd Weller of Hexis Cyber discusses the types of security threats federal agencies are facing on this week's Federal Tech Talk radio show.
Terry Halvorsen, DoD's acting chief information officer, is planning to change the way the military uses and manages its network. The Joint Information Environment is driving many of the modernization efforts across DoD.
A large chunk of the government IT workforce that's charged with implementing the Homeland Security Department's new continuous diagnostics and mitigation initiative still doesn't know much about it. The lack of awareness is most acute with agency inspectors general. But those that have pressed forward with CDM say their networks have already become more secure or less costly.
Executive Editor Jason Miller looks at the news and information you may have missed or that slipped through the cracks at conferences, hearings and the like.
Tags: Jason Miller , Inside the Reporters Notebook , DHS , VA , GSA , HHS , DoT , cybersecurity , acquisition , technology , contracting , Buyers Club , T4 , Stan Lowe , Maria Roat , Charles De Sanno , Jenny Menna , Matt Goodrich , Bobbie Stempfley
Back in 2012, then-defense secretary Leon Panetta warned of a catastrophic cyber attack that could cripple an entire nation or its military. He called it a cyber Pearl Harbor. It was emblematic of a lot of the conventional wisdom that's built up around cyber warfare over the past decade or so. In a recent op-ed, Jay Healey challenges some of that conventional wisdom. Healy is director of Cyber Statecraft Initiative at the Atlantic Council. On In Depth with guest host Jared Serbu, he argued not only is deterrence possible in cyberspace, it's been a reality for a couple decades now.
Quite a number of insider threat incidents have happened because basic security principles were absent, overlooked or ignored. Why Jim Henderson says it's time we get back to the basics.