Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Federal Drive
The next stage of meaningful use will demand even more health information exchange, says HHS's Dr. David Blumenthal.
Defense said it would issue new contractor reporting guidance by last August. The GAO says agencies are still waiting.
As the day draws nearer for the world to run out of the unique addresses that allow us to use the Internet, NIST has some help for managers on how to make the shift securely. We get details from NIST's Sheila Frankel.
Obama administration officials are considering relaxing some security requirements for cloud computing certification to expedite deployments.
McConnell won't count out a shutdown TSA shuts down private screening program
On Friday, the vice chairman of the Joint Chiefs of Staff told reporters that the training of officers and troops the Pentagon has said is a predicate to full repeal would begin in February.
As people share more data electronically and boost their use of mobile applications, they're becoming more vulnerable to cyberattacks.
The federal government is no stranger to Facebook, Twitter, blogs and even photo-sharing sites like Flickr. Using those tools effectively is the subject of the Federal News Radio Discussion: Shouting from the Rooftops.
Round numbers on Wall Street are drawing sharp interest. What should you be watching for? We ask CFP, Arthur Stein.
The Federal Bureau of Investigation announced it had issued more than 40 search warrants throughout America as part of the ongoing investigation "into recent coordinated cyber attacks against major companies and organizations."