Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: DHS
The inconsistent way inspectors general review the security of federal networks and computers is causing uncertainty around what is working and what isn't in the federal government. A recent State Department IG management alert is a prime example of this growing disconnect.
The Postal Service will kick off its pilot to provide identity management services in the cloud in early 2014. The IRS and DHS also are pursuing complimentary initiatives to authorize and authenticate users.
Federal employees are eligible for a free one-day training session in early November on implementing continuous monitoring. The goal is to help agencies make good use of the continuous diagnostics and monitoring contract DHS awarded in August.
The Homeland Security Department has received a mixed report from the inspector general on coordinating cyber operations across government, along with seven recommendations for improvement.
The troubled HealthCare.gov website has been the subject of at least one attempted but unsuccessful cyber attack, according to one of the of the Homeland Security Department's top cyber officials. Lawmakers at a House Homeland Security Committee hearing said the consolidation of personal information and the glitch-prone website are cause for concern.
In this week's edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz in the acquisition and IT communities that you may have missed.
Tags: technology , Digital Government Strategy , Gwynne Kostin , GSA , web analytics , USDA , Amanda Nguyen , HealthCare.gov , House Oversight and Government Reform Committee , Karen Evans , Todd Park , Steven VanRoekel , CMS , OMB , Trey Gowdy , Frank Baitman , Henry Chao , cybersecurity , DATA Act , Federal IT Acquisition Reform Act , Congressional Budget Office , contracting , Mary Davie , Anne Rung , Inside the Reporters Notebook , Jason Miller
The Office of Management and Budget released a new memo Tuesday detailing the steps and deadlines agencies must meet to implement information-system continuous monitoring. The mandate comes on the heels of the General Services Administration and the Homeland Security Department releasing the first task order for continuous diagnostics and mitigation (CDM) tools and sensors, of which Federal News Radio has exclusive details.
Collaboration is the name of the game when it comes to many of the Homeland Security Department's cybersecurity efforts. Doug Maughan, director of DHS' Cybersecurity Division in the department's Science and Technology Directorate, discussed the department's cyber partnerships as part of the Federal News Radio special report, A New Era in Technology.
The Homeland Security Department's Office of Inspector General took a look at DHS' information security program and practices and found them lacking.
The Government Accountability Office in a recent report found the requirement for agencies to report data breaches to the Homeland Security Department within one hour of discovering the incident is of little value.