Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: DHS
The system worked, says Rich Cooper, but resting on laurels is worst possible action.
Agency plans moving forward with re-compete despite GSA's attempt to bring Eagle under the Alliant GWAC. DHS spent almost $2 billion on IT services in 2009 and more than $8 billion overall through the vehicle.
Computer breaches starting to level off, GISLA awards open for nominations
Legislation authorizes critical management functions and programs within S&T, including the Securing the Cities program and authorizing the National Urban Security Technology Laboratory (NUSTL). Rep. Yvette Clarke explains.
A project designed during the Bush Administration to stem the flow of illegal immigration across the U.S.-Mexican border has now fallen on hard times, and formerly supportive lawmakers are now hinting of a dim future for the virtual fence. Thad Bingel, a former Chief of Staff at Customs and Border Protection, explains what's at stake.
New White House guidance calls for agencies to submit data feeds to OMB's Cyberscope tool. Federal CIO Vivek Kundra hopes the information will give agencies a better idea of vulnerabilities and threats to computer networks. Agencies may have to shift money away from traditional reports to upgrade systems to meet new FISMA requirements.
Department to lead the roll out of a federated identity management system for all law enforcement agencies. Justice ran a pilot and now plans on expanding the system nationwide by the end of 2010. The goal is to use technology that already exists and focus on standards and policies.
The virtual fence, better known as SBInet, was originally proposed by the Bush Administration to monitor the southern U.S. border with Mexico. But now, lawmakers on Capitol Hill are quickly losing patience with a project that has had a troubled history, while hemorrhaging hundreds of millions of dollars in costs.
There's a blog, sponsored by the Transportation Security Administration, to facilitate an ongoing dialogue on innovations in security, technology and the checkpoint screening process. Kristin Lee, Assistant Administrator in the Office of Communications and Public Affairs, explains.