Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Francis Rose
Two recent cyber incidents hightlight the real threat that cyber attacks can have, Vance Taylor, a partner Catalyst said. He penned a blog post on SecurityDebrief.com calling the most recent of these a "stark reminder."
Your password might not be as secure as you think. Do these passwords sound familiar: "123456," "password" and "monkey." Those are just a few of the 25 worst passwords according to Splash Data.
Steve Kelman, a professor of public management at Harvard University's Kennedy School of Government and the former administrator of the Office of Federal Procurement Policy, said in an in interview on In Depth with Francis Rose that agencies should consider a range of options to find contracting savings. His own list of cost-savings tips runs the gamut from "Nobody's ever done this," to "So old, it's new again."
DISA wants improve its enterprise information visibility for the department's 15,000 unclassified networks by creating an Enterprise Information Web. The semantic Web will allow data to be more easily shared and reused across the department.
Furloughs, layoffs, more buyouts and shrinking pay and benefits. Those have all heightened the awareness of "Sequestration Anxiety," Tom Shoop, the editor-in-chief of Government Executive magazine, said in an interview on In Depth with Francis Rose.
Bradley Anstis is the vice president of technical strategy at M86 Security, joined In Depth with Francis Rose to discuss the network threats, why the Android platform is an increasing target and what agencies can do protect themselves.
Larry Allen, the president of Allen Federal and the former president of the Coalition for Government Procurement, joined In Depth with Francis Rose to discuss what these new contracts could mean for federal agencies — and why there are so many.
Your Thrift Savings Plan is probably home to the G Fund — and maybe some C Fund as well. But there's more to the TSP than just those two funds.
The Justice Department, Immigration and Customs Enforcement and the FBI have teamed up to take 150 websites that are alleged to have sold counterfeit products.