Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: FBI
The House approved the first spending bill for 2013, setting operating budgets for the Commerce and Justice Departments and for science-related agencies, such as NASA.
The FBI's former top cyber cop has taken a job with a startup company to help protect private-sector computer networks that he says are already under constant attack with intrusions.
For seven years, E.J. O'Malley has been a health and fitness instructor at the FBI Academy in Quantico, Va. Four times a year, he instructs law enforcement personnel from across the U.S. and around the world at the FBI's National Academy - a 10-week course that includes a comprehensive physical training program. Read O'Malley's story as part of our "Cool Jobs in Government" series.
A lawyer for FBI whistleblower Sibel Edmonds said Tuesday the bureau's prepublication review office has adopted overly expansive restrictions that are preventing Edmonds from publishing a book about her life at the FBI.
The FBI's Criminal Justice Information Services says local law enforcement needs to encrypt its data if it wants to join the cloud. The FBI said when information is encrypted from the start, police can have control of its cybersecurity on any cloud system, according to a post on InfoSecurity.
The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.
Tags: technology , management , ODNI , Gordon Snow , John Swift , Rob Carey , DoD , Diana Braun , Insider Threat Task Force , White House , HSPD 12 , secure identity card , identity management , PKI , information sharing , WikiLeaks , insider threat , FOSE , Jason Miller
The FBI's chief information officer, Chad Fulgham, will step down next month after three years at the helm of the agency's information technology efforts, the FBI announced in a release.
FBI allowed the servers to run for 120 days to give owners of infected computers time to clean out the DNSchanger malware. But the bureau dropped the ball on getting the word out.
Rep. Adam Smith of Washington state and Sen. Mark Udall of Colorado introduced legislation that would repeal provisions of the defense bill that President Barack Obama signed into law Dec. 31.