Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: DHS
WFED's Jason Miller reports.
The system worked, says Rich Cooper, but resting on laurels is worst possible action.
Agency plans moving forward with re-compete despite GSA's attempt to bring Eagle under the Alliant GWAC. DHS spent almost $2 billion on IT services in 2009 and more than $8 billion overall through the vehicle.
Computer breaches starting to level off, GISLA awards open for nominations
Legislation authorizes critical management functions and programs within S&T, including the Securing the Cities program and authorizing the National Urban Security Technology Laboratory (NUSTL). Rep. Yvette Clarke explains.
A project designed during the Bush Administration to stem the flow of illegal immigration across the U.S.-Mexican border has now fallen on hard times, and formerly supportive lawmakers are now hinting of a dim future for the virtual fence. Thad Bingel, a former Chief of Staff at Customs and Border Protection, explains what's at stake.
New White House guidance calls for agencies to submit data feeds to OMB's Cyberscope tool. Federal CIO Vivek Kundra hopes the information will give agencies a better idea of vulnerabilities and threats to computer networks. Agencies may have to shift money away from traditional reports to upgrade systems to meet new FISMA requirements.
Department to lead the roll out of a federated identity management system for all law enforcement agencies. Justice ran a pilot and now plans on expanding the system nationwide by the end of 2010. The goal is to use technology that already exists and focus on standards and policies.
The virtual fence, better known as SBInet, was originally proposed by the Bush Administration to monitor the southern U.S. border with Mexico. But now, lawmakers on Capitol Hill are quickly losing patience with a project that has had a troubled history, while hemorrhaging hundreds of millions of dollars in costs.