Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: DoD
The head of U.S. Cyber Command says cloud computing is part of his plan for staying ahead of the cyber threats that face the Defense Department. “A year from now we should be well on our way to having a hardened architecture proven and in place, which provides a new level of cybersecurity,” said General [...]
Sen. Tom Carper (D-Del) is chairing a hearing on weapons systems cost overruns this afternoon.
The Government Accountability Office said in findings announced to Congress Tuesday that the Nunn-McCurdy amendment, designed to curtail cost growth in Defense programs, has succeeded in bringing an end to only one overly costly military program in the last 14 years.
Ashton Carter, the Defense Department's undersecretary for acquisitions, said the Pentagon can buy things quickly when it truly needs to. But when it comes to supporting overseas contingency operations, he said the country needs a dedicated, permanent "fast lane" that leapfrogs DoD's notoriously slow methods of buying goods and services.
The Pentagon wants servicemen and women to use their own smartphones to develop apps and access the military's networks. Senior officials as early as next month will approve the technical standards for devices that run the Apple and Google operating systems.
The National Research Council says that a rise in sea levels of about three feet could jeopardize $100 billion worth of Navy installations.
A new call center, staffed by professionals trained to handle grieving callers, is among the first technology upgrades the Army has made in the aftermath of a management scandal at Arlington National Cemetery last year. Phase two will involve tackling the massive challenge of digitizing the cemetery's paper records.
March 23rd, 2011 at 11 AM
Criminal enterprises operating globally - so-called "Transnational Criminal Organizations" -- have spent years refining their approaches to all types of illicit trafficking including narcotics, weapons, illicitly gained and laundered money, and even modern day slavery. In many ways, these organizations can be considered multi-national corporations, given their size, reach, and sophistication. Indeed, their production and logistics operations rival best practices in the commercial sector, with highly resilient supply chains driven by the need to minimize the risk of seizure. TCOs often directly and indirectly enable, support, and facilitate insurgencies and terrorism; undermine state stability, security, and sovereignty; and corrupt legitimate global financial and trade networks. The stakes are high. U.S. Law Enforcement, Homeland Security, and the Department of Defense (DoD) find themselves at the front lines of this global security issue. As criminal organizations adapt to traditional interdiction methodologies, stakeholders across government are coming together to stem the tide, looking at what new technologies and whole of government approaches can be brought to bear to address this complex threat.
The idea is to treat cyberspace as a domain within DoD and employ active cyber defenses and other new defense approaches.