bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
1:59 am, September 2, 2014

Search Result

Search Tags:  In Depth

DHS to use social networks for intel

The Department of Homeland Security wants to be your "friend" whether you invite them or not.

Tags: Cybersecurity Update , technology , DHS , social networks ,

Wednesday - 11/02/2011, 06:19pm EDT

Hackers recycling malware ... or getting lazy

The malware was originally written for Linux nearly ten years ago, but hackers are recompiling the code to make it run on Mac OS X.

Tags: Cybersecurity Update , technology , Computer World , hacker , malware

Wednesday - 11/02/2011, 06:17pm EDT

Analysis: DoD spending cuts small in context of history

Gordon Adams, a professor of international relations at American University and former associate director at the Office of Management and Budget, outlines how draw downs have impacted DoD budgets since World War II.

Tags: Gordon Adams , American University , DoD , OMB , financial management , budget ,

Tuesday - 11/01/2011, 06:03pm EDT
Listen

F-35 training may be delayed over security warnings

The Air Force, Navy and Lockheed Martin are pushing for training to begin on the new F-35 Joint Fight Strike Fighter, despite recommendations to postpone training by 10 months.

Tags: F-35 , Air Force , DoD Report , Wired , contracting

Tuesday - 11/01/2011, 06:06pm EDT

Agencies can say no to GAO recs

By law, agencies do not have to follow GAO's recommendations but most do, says William Welch, chair of the Government Contracts Practice Group at General Counsel.

Tags: William Welch , General Counsel , GAO , VA , SBA , contracting , bid protest , Congress

Monday - 10/31/2011, 04:37pm EDT
Listen

Seven lessons from the Recovery Act

Ed DeSeve was the Special Advisor to the President for Recovery Implementation and is now the President of the Global Public Leadership Institute. He writes about the lessons learned in a new report by the IBM Center for the Business of Government.

Tags: Ed DeSeve , Recovery Act , stimulus funding , transparency , management , budget , best practices

Monday - 10/31/2011, 04:31pm EDT
Listen

Copycat malware not from Stuxnet creators

The Stuxnet worm doesn't have a twin after all. Last month Symantec discovered a malware threat with such strong similarities to Stuxnet they called it the Son of Stuxnet.

Tags: Cybersecurity Update , Stuxnet , technology , malware , hacker , Dugu

Monday - 10/31/2011, 04:51pm EDT

Army war games tackles future capabilities

Unified Quest is an annual scenario-planning exercise for the Army to examine future force development.

Tags: DoD Report , Unified Quest , Army , Wired ,

Monday - 10/31/2011, 04:49pm EDT

U.S. suspects China in satellite hacking

Bloomberg BusinessWeek reports the United States is blaming China for two hacking attacks in 2007 and 2008.

Tags: Bloomberg BusinessWeek , Cybersecurity Update , technology , China

Friday - 10/28/2011, 07:41pm EDT

GAO examines government's fiscal health

Susan Irving, director for Federal Budget Analysis at GAO, shared the findings from the GAO report, "The Federal Government's Long-Term Fiscal Outlook: Fall 2011 Update."

Tags: Susan Irving , GAO , budget , financial management ,

Friday - 10/28/2011, 07:29pm EDT
Listen
  •  
  • 178
  •