Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: DHS
New Microsoft patches to be released
The space agency's experience in reducing the number of its e-mail systems could serve as a model for others who are going down a similar path. NASA's benefits include cost savings, better cybersecurity and scalability to deal with the expanding need for mobile access.
The federal agency in charge of protecting other agencies from computer intruders was found riddled with hundreds of high-risk security holes on its own systems.
The National Cybersecurity Protection System is testing software and hardware from the Defense Department and industry to figure out how to expand the Einstein toolset. DHS reports that 13 of 19 major agencies already have installed Einstein 2. The department also is planning to hold an industry day for a classified cyber RFI.
September 14th at 12PM
Program will discuss the progress report on information & intelligence sharing programs, key initiatives ongoing to improve secure information sharing, identifying what type of information needs to be shared, how fusion centers are key to reaching out to the private sector, and a vision for the future for secure information and intelligence sharing.
Tags: technology , Federal Executive Forum , Bart Johnson , David Wennergren , Theresa Hadden , fairfax county , Timothy Brown , CA Technologies , Sam Chun , HP , Allan Thompson , Dataguise , Jim Flyzik , Trezza , Flyzik Group
Also, is Defense cybersecurity spending asymmetrical?
The failed bombing attempts in New York City and aboard a U.S. flight to Detroit has sparked concern over Uncle Sam's watchlisting system.
Traditional surveillance cameras can be a great help to law enforcement officers for a range of missions, including canvassing a crowd for criminal activity, or trailing a terrorist. But there are shortfalls, like a loss of visual contact with the rest of the scene when zooming in on a specific point of interest. A new video surveillance system being developed now by the Department of Homeland Security's Science and Technology Directorate called the Imaging System for Immersive Surveillance (or ISIS) takes new camera technology - and real-time image-stitching - and bolts it to a ceiling, mounts it on a roof, or fastens it to a truck-mounted mast. A unique interface then allows the user to maintain a full field of view, while a focal point of choice can be magnified. Like a fisheye lens, ISIS sees v-e-r-y wide. But, whereas a typical fisheye lens distorts an image and can only provide limited resolution, video from ISIS is perfectly detailed, from edge-to-edge.
The Department of Homeland Security has embarked on a project to develop an advanced sensor system for monitoring shipping containers from their point-of-storage to release in the maritime supply chain. The Advanced Container Security Device (or ACSD) is a small unit that attaches to the inside of a container and monitors all six sides for any intrusion or the presence of human cargo. If the device detects such an intrusion or presence it transmits alarm information through the Marine Asset Tag Tracking System to U.S. Customs and Border Protection. The ACSD will also build in a standard plug-and-play interface so that other security or commercial sensors (such as those measuring radiological, chemical, or biological factors) can be easily integrated through a standard interface. 40 prototype systems have been delivered, tested and evaluated. This fiscal year, the project plans to remedy shortfalls discovered during prototype testing and put improvements in place.
Learn more in today's cybersecurity update.