Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: DoD
Al Qaida in Iraq has claimed responsibility for last week's car bomb attack on an Iraqi army unit that killed at least eight soldiers The bomb targeted an army headquarters in the northern area of Diyala province. 30 others were wounded when it exploded last Monday. Security forces stopped a second attack and defused a car bomb parked at the scene. The attacks in Iraq are a daily occurrence as insurgence continue to attack Iraqi forces knowing that U.S. troops are leaving Iraq totally at the end of this year.
Despite a 2006 mandate to secure mobile devices and implement two-factor authentication, only just over half of federal agencies have managed to do so. OMB submits its annual FISMA report to Congress detailing the steps the government has taken to improve cybersecurity, including spending $12 billion on cybersecurity last year.
Tags: technology , management , Vivek Kundra , OMB , GSA , NASA , DHS , U.S. CERT , NIST , cybersecurity , FISMA , Continuous monitoring , encryption , HSPD-12 , Cyber Workforce , CyberStat , Cyberscope , supply chain , Jason Miller
Susan Lawrence, the Army's newly-appointed Chief Information Officer members of the IT and communications industry that the service is focused on creating an end-to-end IT infrastructure, eliminating structures that required soldiers to train and live on one network, and deploy on another.
Shay Assad, director of the office of Defense Procurement and Acquisition Policy, told industry professionals Thursday that DoD would provide them with a clearer picture of what the Pentagon wants when it issues solicitations to industry. Past acquisition processes, he said, had forced vendors to guess what factors DoD thought were truly important.
Retired Air Force Colonel Chet Richards says DoD has missed the mark in several of its big decisions during recent years. He says defense leaders are making choices that leave people scratching their heads.
Cadets at West Point are on the cyber-front lines. How are they preparing for these new roles?
It's that time of year again when you have to fill out your March Madness brackets. But not for the basketball tournament -- for the cyber defense contest.
More U.S. troops who sustain combat-related brain injuries could soon be eligible for the Purple Heart.
The Defense Department is looking to standardize the procedures its components use in source selection under competitive acquisitions. New DoDwide procedures issued this month will take effect in July.
The State Department's senior adviser for non-proliferation and arms control says Iran is approaching the capability to produce nuclear weapons. Robert Einhorn told the Arms Control Association yesterday in his own words, "We believe that at a minimum Iran is moving to the threshold of a nuclear weapons capability." But he clarified that he was referring to their intentions rather than their actual capabilities. Some have speculated Iran could reach the point where it could produce a nuke this year.