Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: In Depth
Gov Exec's Tom Shoop discusses how federal workers and agencies are preparing for a possible shutdown.
For federal IT professionals, getting your security clearance is only half the battle.
Expect a wave of spear-phishing e-mails looking for personal information and log-on credentials. This after Epsilon, an online marketing firm, was hacked. Thieves harvested millions of valid e-mail addresses.
Three contractors are sweeping up more than $1.3 billion in defense deals.
Federal News Radio's Mike Causey, Amy Morris and Tom Temin give their insights on what might happen in the coming days as Congress tries to beat the budget deadline.
Cybersecurity is often discussed in generic terms and vague descriptions. But one industry expert is calling the Department of Homeland Security's new cyber document clear and concise.
Stan Sloane, president and CEO of SRA International, discusses what's in the deal and what it means for outstanding contracts.
Jim Horney, director of Federal Fiscal Policy at the Center on Budget and Policy Priorities, offers his analysis of will happen this week and what that'll mean for your agency.
It's all about the money. And for the Defense Department pinning down the exact cybersecurity figure is almost impossible.