Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: DoD
The idea is to treat cyberspace as a domain within DoD and employ active cyber defenses and other new defense approaches.
The Department of Defense is working with private developers to create a system that automatically detects and prevent network intrusions.
The Army and Marine Corps are both in the early phases of deploying logistics accountability systems that will replace a collection of disconnected, stovepiped IT systems and processes that have grown up since the 1960s. Though the systems share the same objective, they were made by different vendors, prompting questions from one member of Congress.
Tags: Congress , management , Army , Marine Corps , Claire McCaskill , financial management , DoD budget , Enterprise Resource Planning , Drew Dwyer , James Amos , Senate Armed Services Committee , Jared Serbu , DoD Report
Al Qaida in Iraq has claimed responsibility for last week's car bomb attack on an Iraqi army unit that killed at least eight soldiers The bomb targeted an army headquarters in the northern area of Diyala province. 30 others were wounded when it exploded last Monday. Security forces stopped a second attack and defused a car bomb parked at the scene. The attacks in Iraq are a daily occurrence as insurgence continue to attack Iraqi forces knowing that U.S. troops are leaving Iraq totally at the end of this year.
Despite a 2006 mandate to secure mobile devices and implement two-factor authentication, only just over half of federal agencies have managed to do so. OMB submits its annual FISMA report to Congress detailing the steps the government has taken to improve cybersecurity, including spending $12 billion on cybersecurity last year.
Tags: technology , management , Vivek Kundra , OMB , GSA , NASA , DHS , U.S. CERT , NIST , cybersecurity , FISMA , continuous monitoring , encryption , HSPD-12 , Cyber Workforce , CyberStat , Cyberscope , supply chain , Jason Miller
Susan Lawrence, the Army's newly-appointed Chief Information Officer members of the IT and communications industry that the service is focused on creating an end-to-end IT infrastructure, eliminating structures that required soldiers to train and live on one network, and deploy on another.
Shay Assad, director of the office of Defense Procurement and Acquisition Policy, told industry professionals Thursday that DoD would provide them with a clearer picture of what the Pentagon wants when it issues solicitations to industry. Past acquisition processes, he said, had forced vendors to guess what factors DoD thought were truly important.
Retired Air Force Colonel Chet Richards says DoD has missed the mark in several of its big decisions during recent years. He says defense leaders are making choices that leave people scratching their heads.
Cadets at West Point are on the cyber-front lines. How are they preparing for these new roles?
It's that time of year again when you have to fill out your March Madness brackets. But not for the basketball tournament -- for the cyber defense contest.