Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Cybersecurity
With 50 billion devices connected to the Internet, the rules of cybersecurity are changing. Agencies and more companies are on to the importance of cybersecurity, but they might be watching out for high-profile threats rather than more common and stealthy problems that can do lots of damage. That's what Cisco has found and will release in a report. Levi Gundert is the technical lead for Cisco's Threat Research, Analysis and Communications, or TRAC. He spoke with Tom Temin and Emily Kopp on the Federal Drive.
Federal employees are a prime target for hackers and other bad guys when on vacation. Learn 12 tips for keeping you and your federal-issued laptop safe while out of the office this summer.
Federal employees are prime targets for hackers. If not properly secured, the computers and mobile devices they carry could open up their agency's network to malicious attacks. Devices can be especially vulnerable when you're on vacation and it's easy to let your guard down. Jerry Irvine is the chief information officer and a partner of Prescient Solutions. He told Tom Temin and Emily Kopp on the Federal Drive what feds should be aware of when they're traveling.
Larry Zelvin is stepping down as the director of DHS's National Cyber and Communications Integration Center (NCIC) next month after almost 30 years of government service.
Chief legal counselor to NSA says intelligence disclosures may have set back efforts to improve nation's cybersecurity posture because of increasing unease about public-private cooperation, and that it's time to reexamine the digital privacy trust relationship between government and the public.
The cyber attacks on small federal agencies demonstrate the cyber domain is an ecosystem, and the federal government is one of many different cyber cultures. One expert says a map of the different cultures can help agencies prevent cyber attacks. Ben Fitzgerald is senior fellow and director of the Technology and National Security Program at the Center for a New American Security. He explained that and other cybersecurity strategies on In Depth with Francis Rose.
The National Association of Corporate Directors' (NACD) Handbook on Cyber-Risk Oversight, introduced Tuesday at the National Press Club in Washington, outlines five key principles that aim to move forward the collaborative cybersecurity effort.
Inside the Reporter's Notebook: Category management launches five pilots; more vendor past performance data
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities.
Tags: Inside the Reporters Notebook , Jason Miller , Defense Intelligence Agency , DoE , Commerce , Mike Maraya , cybersecurity , Rod Turk , Grant Schneider , Sydney Smith-Heimbrock , Marie Davie , Marty Jennings , Tom Sharpe , Dick Ginman , Alan Chvotkin , GSA , OFPP , category management , Lesley Field , Past performance , technology , people , acquisition , Professional Services Council
The National Security Agency's top lawyer says the Edward Snowden disclosures not only hurt U.S. intelligence gathering capabilities - they may have also damaged the chance of Congress successfully passing cybersecurity legislation anytime in the near future.
By some estimates, taking out just nine critical electrical substations could plunge the whole nation into darkness. Threats to the electrical grid aren't just from cybersecurity, but also from a lack of physical security. The Federal Energy Regulatory Commission asked the Battelle Memorial Institute to look into security of the bulk electricity system. Jason Black is the research leader at Battelle. He joined Tom Temin and Emily Kopp on the Federal Drive to talk about his findings.