Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: FBI
Janice K. Fedarcyk has led the FBI's largest field office for two years.
Many forward-thinking enterprises in the government and commercial sectors are using cloud environments to improve scalability, agility, automation, and efficiency. The operating landscape for these organizations is rapidly evolving: Costs are reduced. Data is ubiquitous. Information is flowing from more sources than ever before. However, the same features that create such high promise for the cloud also bring a potential for new levels of criminal exploitation through fraud. A distinguished panel of top experts will look at the new face of fraud in a digital age, provide insights in how to prevent, detect and investigate fraud in the cloud and identify options to combat fraud in the cloud computing world.
Timothy Ryan joins Kroll Advisory Solutions as managing director.
The FBI is warning the public of a new "drive-by" virus that is sending fake messages that appear to be from federal agencies.
The long-awaited, problematic case management application met full operational capability in May. Jeff Johnson, the FBI's CTO, said about 30,000 employees have been using Sentinel for about a month. The $451 million program modernizes the FBI's workflow and document management system.
The FBI wants an automated testing system that can handle all Android applications. Researchers are trying to standardize a technique called fuzzing that forces outside data into the apps to find weaknesses.
Using a DARPA grant and its own money, the FBI has enlisted researchers at George Mason University to try out so-called fuzzing attacks.
On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.
The Justice Department and the FBI will review thousands of criminal convictions from over a decade ago for possibly flawed analysis of hair sample evidence.