Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: DoD
Bill would require Defense to explore new cybersecurity buys and tools, First governmentwide cyber provider approved
Military pay raise for 2011 will stay at 1.4% in Senate version of Defense Authorization Bill.
The Department of Defense has announced it will use the FBI-owned and maintained eGuardian suspicious activity reporting system as a long-term solution to ensure access to appropriate threat information. The announcement follows two years of analysis and a six-month pilot program, and a recommendation this past January by the DoD Independent Review related to the shootings at Fort Hood that DoD adopt a reporting system for documenting, storing, and exchanging threat information. Those using the system will be trained with regard to the protection of civil liberties. Through its use, DoD law enforcement and security personnel will be able to share potential terrorist threats, terrorist events, and suspicious activity information with other state, local, tribal, federal law enforcement agencies, state fusion centers, and the FBI's Joint Terrorism Task Force.
The military is performing a proof of concept in Utah by putting transit benefits on employees' Common Access Cards. USDA is implementing technology to require the use of HSPD-12 cards to log onto applications.
Federal agencies scrambling on DNSSEC implementation
It's being called a potential traffic catastrophe. Thousands of federal workers, and their cars, are being shifted to already crowded roads in Northern Virginia as part of BRAC. Now, there are efforts to stop it.
A Major General in Haiti describes how much things have changed.
To achieve concrete outcomes, the will to drive change in an enterprise-wide perspective is needed to continue to breaking down barriers. We get an update on how that's going from the director of enterprise integration at DoD's Business Transformation Agency, Prashant Gaur.
Poisoned PDFs? Here's your antidote
Every year, one distinguished federal IT acquisition manager receives the coveted John J. Franke award for career excellence. The award last night went to Jim Williams, who recently retired from the GSA as the Commissioner of the Federal Acquisition Service.