Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: FBI
Janice K. Fedarcyk has led the FBI's largest field office for two years.
Many forward-thinking enterprises in the government and commercial sectors are using cloud environments to improve scalability, agility, automation, and efficiency. The operating landscape for these organizations is rapidly evolving: Costs are reduced. Data is ubiquitous. Information is flowing from more sources than ever before. However, the same features that create such high promise for the cloud also bring a potential for new levels of criminal exploitation through fraud. A distinguished panel of top experts will look at the new face of fraud in a digital age, provide insights in how to prevent, detect and investigate fraud in the cloud and identify options to combat fraud in the cloud computing world.
Timothy Ryan joins Kroll Advisory Solutions as managing director.
The FBI is warning the public of a new "drive-by" virus that is sending fake messages that appear to be from federal agencies.
The long-awaited, problematic case management application met full operational capability in May. Jeff Johnson, the FBI's CTO, said about 30,000 employees have been using Sentinel for about a month. The $451 million program modernizes the FBI's workflow and document management system.
The FBI wants an automated testing system that can handle all Android applications. Researchers are trying to standardize a technique called fuzzing that forces outside data into the apps to find weaknesses.
Using a DARPA grant and its own money, the FBI has enlisted researchers at George Mason University to try out so-called fuzzing attacks.
On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.
The Justice Department and the FBI will review thousands of criminal convictions from over a decade ago for possibly flawed analysis of hair sample evidence.