Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: FBI
Learn more from Homeland Security Today editor David Silverberg.
The Federal Bureau of Investigation identified 14 suspected "leakers" of classified U.S. intelligence information.
The FBI's new cyber-intelligence still needs a home.
The challenge of securing the nation's IT infrastructure has often been likened to building an airplane as it flies through the air -- or even herding cats.
The new immigration law in Arizona is having a ripple effect across the country, and the debate over how authorities report the immigration status of suspects has now come to the D.C. area.
The Department of Defense has announced it will use the FBI-owned and maintained eGuardian suspicious activity reporting system as a long-term solution to ensure access to appropriate threat information. The announcement follows two years of analysis and a six-month pilot program, and a recommendation this past January by the DoD Independent Review related to the shootings at Fort Hood that DoD adopt a reporting system for documenting, storing, and exchanging threat information. Those using the system will be trained with regard to the protection of civil liberties. Through its use, DoD law enforcement and security personnel will be able to share potential terrorist threats, terrorist events, and suspicious activity information with other state, local, tribal, federal law enforcement agencies, state fusion centers, and the FBI's Joint Terrorism Task Force.
When it comes to securing the nation's cybersecurity infrastructure, how do federal officials think of the future? One of the top cybersecurity officials at the Department of Homeland Security weighed in on the topic at the ISC2 SecureAmericas conference yesterday.
The agency plans to deploy a high-speed network, new Office-based PCs, and other infrastructure improvements.
Hoping to make the third nomination the charm, the White House has tapped FBI Deputy Director John Pistole to head the Transportation Security Administration. Former nominee Erroll Southers tells us what's at stake.
Cyber criminals know how to steal online funds, but the criminals who know how to convert those funds into cash are now being targeted specifically by the FBI.
Agency officials say they're targeting - what they call - the "money mules" who receive the transfers of stolen funds into their bank accounts. They then make the transaction appear legitimate, sending the money to associates in other countries.
The FBI hopes to raise public awareness and dissuade people from becoming mules. The FBI hopes to raise public awareness and dissuade people from becoming mules.