Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: DHS
Agencies are testing an assortment of smartphones and tablet computers to improve how their workforces meet their missions. But there still are questions about the security of these devices.
Tags: technology , telework , cybersecurity , mobile , ACT/IAC , ICE , Jerry Rhoads , DoJ , ATF , Rick Holgate , GSA , Sonny Bhagowalia , Apple , iPad , Research in Motion , BlackBerry , Samsung , Android , Google , tablet computing , mobile apps , Challenge.gov , mobile computing , Max Cacas
The Defense Department and the Department of Homeland Security signed a memo of agreement to join forces in cybersecurity.
Stop. Think. Connect. In that order.
In a first, the Department of Homeland Security launched its annual National Cybersecurity Awareness Month from two cities at the same time: Washington, D.C. and Seattle. Officials reminded government, industry and the general public about good cyber hygiene.
Alma Cole leads the SOC, tasked with cybersecurity for DHS and its component agencies.
Tight security measures both tighten the leashes of executives, while driving them out of the office.
During chemical, biological, and radiological/nuclear atmospheric releases, the more information available about which way the wind is blowing, the better. To that end, WeatherBug, DHS and DOE are working together. Details from WeatherBug's Bill Callahan.
Congressman Jim Langevin (D-RI) has introduced the Strengthening Cybersecurity for Critical Infrastructure Act, which would allow the Administration to create a more robust set of regulations for the information systems that control our critical infrastructure.
Congressman Henry Cuellar's homeland security bill to direct the Federal Emergency Management Agency to assess the efficiency of homeland security grants is about to become law. He explains how it will work.
Deputy Secretary Lute told the Senate Homeland Security and Governmental Affairs Committee about how DHS is improving contracting processes. Acquisition is one of three major areas that the department is focusing on to bring integration across all 22 components. Lute said part of her goal is to get off the GAO high-risk list.
Tags: contracting , management , industry , Janet Holl Lute , Daniel Akaka , Cathleen Berrick , GAO , Senate Homeland Security and Governmental Affairs , acquisition processes , Quadrennial Homeland Security Review , financial management , management integration , Jason Miller