bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
8:47 pm, October 20, 2014

Search Result

Search Tags:  FBI

FBI disputes claims of hackers' Apple data breach

FBI officials said the bureau never asked for and never possessed the database that the group, which calls itself AntiSec, is posting on a website.

Tags: cybersecurity , hackers , technology , NCFTA , AntiSec , Apple , Cybersecurity Update

Tuesday - 09/04/2012, 09:22pm EDT

Agencies get better at 'whole of government' info sharing

The head of the federal government's information sharing initiative says agencies are doing a better job in a post-9/11 environment. Kshemendra Paul is the program manager for the Information Sharing Environment.

Tags: Kshemendra Paul , ISE , DHS , DoJ , information sharing , technology , NIEM , Federal Drive

Thursday - 08/30/2012, 12:59pm EDT
Listen

IT projects pulled from brink of failure

TechStat is rarely about shutting down problematic technology programs. In an exclusive report, Federal News Radio examines how agencies are using the analysis to support existing improvement plans, to move to agile development and to change its relationship with contractors. CBP, NARA and the FBI are recent examples of agencies taking advantage of the visibility and transparency TechStat brings to get programs back on track and completed.

Tags: technology , oversight , OMB , Steven VanRoekel , Vivek Kundra , NARA , Mike Wash , Scott Stovall , Jeffrey Johnson , Customs and Border Protection , Linda Jacksta , ACE , ERA , Sentinel , TechStat , Inside TechStat , Jason Miller , Exclusive

Wednesday - 08/15/2012, 05:16am EDT
Listen

NY FBI field office boss, highest woman, retiring

Janice K. Fedarcyk has led the FBI's largest field office for two years.

Tags: Janice K. Fedarcyk , retirement , Federal Drive

Thursday - 08/16/2012, 08:38pm EDT

The Cloud as a Shroud: Fraud in a Digital Age

Many forward-thinking enterprises in the government and commercial sectors are using cloud environments to improve scalability, agility, automation, and efficiency. The operating landscape for these organizations is rapidly evolving: Costs are reduced. Data is ubiquitous. Information is flowing from more sources than ever before. However, the same features that create such high promise for the cloud also bring a potential for new levels of criminal exploitation through fraud. A distinguished panel of top experts will look at the new face of fraud in a digital age, provide insights in how to prevent, detect and investigate fraud in the cloud and identify options to combat fraud in the cloud computing world.

Tags: Booz Allen Expert Voices , Booz Allen Hamilton , Expert Voices , Bill Fox , Timothy A. Gallagher , William J. Mahon , Richard Ingraham , Mark Herman

Thursday - 04/19/2012, 04:55pm EDT
Listen

FBI cybersecurity expert enters private sector

Timothy Ryan joins Kroll Advisory Solutions as managing director.

Tags: Timothy Ryan , cybersecurity , Cybersecurity Update , technology , Kroll Advisory Solutions , Federal Drive

Tuesday - 08/14/2012, 08:25am EDT

New virus sends fake message from the FBI

The FBI is warning the public of a new "drive-by" virus that is sending fake messages that appear to be from federal agencies.

Tags: cybersecurity , Cybersecurity Update , technology , In Depth ,

Friday - 08/10/2012, 09:03pm EDT

FBI turns troubled into triumph with Sentinel system

The long-awaited, problematic case management application met full operational capability in May. Jeff Johnson, the FBI's CTO, said about 30,000 employees have been using Sentinel for about a month. The $451 million program modernizes the FBI's workflow and document management system.

Tags: technology , DoJ , Jeff Johnson , Sentinel , Case management system , Agile software development , Lockheed Martin , Jason Miller

Wednesday - 08/01/2012, 05:15am EDT
Listen

FBI tests mobile vulnerabilities

The FBI wants an automated testing system that can handle all Android applications. Researchers are trying to standardize a technique called fuzzing that forces outside data into the apps to find weaknesses.

Tags: cybersecurity , mobile , In Depth , Francis Rose , Cybersecurity Update

Tuesday - 07/17/2012, 08:14pm EDT
  •  
  • 7
  •