Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: DHS
Department of Homeland Security officials say 100 percent of passengers traveling in the U.S. and its territories are now being checked against terrorist watchlists through the Transportation Security Administration's Secure Flight program - a major step in fulfilling a key 9/11 Commission recommendation. Secure Flight enables TSA to screen passengers directly against government watchlists using passenger's names, their date of birth, and gender before a boarding pass is issued. In addition to facilitating secure travel for all passengers, the program helps prevent the misidentification of passengers who have names similar to individuals on government watchlists. Officials say 99 percent of passengers will be cleared by Secure Flight to print boarding passes at home by providing their date of birth, gender and name as it appears on the government ID they plan to use when traveling.
Agencies recycled more than 51,000 pounds of electronics, purchases more than 58,000 hardware that met the green standards and saved the government more than $11 million.
Susan Zeleniak of Verizon Federal explains that Networx will benefit all agencies and vastly improve the way things work -- once agencies make the move, that is.
Today we get the perspective of former OFPP administrator Steve Kelman.
Gen. Keith Alexander calls for the Cyber Command to have real time understanding of what's going on in their computer networks. He also calls for a common operational picture as a part of improving situational awareness. Alexander also says DoD is putting a lot of effort and focus on ensuring privacy and civil liberties laws and regulations are followed.
One the world's largest supercomputers is being used to forecast, in 3D, how BP's massive Gulf of Mexico oil spill will affect coastal areas. Blue Waters Program director Irene Qualters explains how it works.
Bill would require Defense to explore new cybersecurity buys and tools, First governmentwide cyber provider approved
AT&T receives an authority to operate its cybersecurity services under the Networx telecommunications contract. Agencies now can purchase these services to meet the Trusted Internet Connections requirements.
Tags: technology , Contracting , OMB , GSA , FTC , EPA , Treasury , AT&T , Qwest , Sprint , Verizon , Jeff Mohan , Tom McMahon , Bill White , Networx , telecommunications , cybersecurity , TIC , MTIPS , Jason Miller
In speech after speech, officials talk about the need for government and industry to work together to solve cybersecurity challenges. But for the past five years, a government-industry partnership has actually been making good on the promise of collaboration in the cybersecurity arena.
From NSA to the TSA -- CIO Emma Garrison-Alexander explains her experiences this week on the show.
May 27, 2010