Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Federal Drive
McAfee plans to provide better protection, not only at the PC and server software level, but in the network appliance, embedded system and cloud-computing areas
A new tool that eliminates drive-by download threats has been developed by researchers. Wenke Lee, professor in the Georgia Tech's School of Computer Science, explains how it works.
Air Force Doctrine Document 3-12, Cyberspace Operations is now available.
Warner's proposed legislation requires federal agencies to do less work with performance data more often. More details from Mark Warner.
Military members more in debt than civilians,
Imagine not having to worry about computer viruses when you surf the Internet. It's one of the things the Air Force's Lightweight Portable Security team is working on. We learn more about it, and how to get it for free, from team leader Rich Kutter.
A new report finds contractors should balance portfolios across the spectrum of warfare, accommodating the shift in how the U.S. military plans, organizes and equips for battle.
Who should get first preference for contracts? A new law should help figure that out. Venable's Rob Burton explains it for us.
With the Walter Reed Army Medical Center set to close in less than a year, DC officials are unveiling their plans to redevelop a 62-acre portion of the hospital grounds into a neighborhood with new homes, shopping, green space and schools.
Computer experts at the secretive National Security Agency are teaming up with the Homeland Security Department in an effort to strengthen the nation's defenses against cyber attacks.