1:08 pm, September 30, 2014

Search Result

Search Tags:  In Depth

Researchers urge gov to declassify cyber threat details

George Mason University researchers are calling on the government to declassify details about cyber threats. Jerry Brito is one of the researchers behind the call.

Tags: Cybersecurity Update , technology , Jerry Brito , George Mason University , Mercatus Center ,

Thursday - 04/28/2011, 06:01pm EDT

How DoD can correct over-reliance on war contractors

The Commission on Wartime Contracting in Iraq and Afghanistan is relying on the Government Accountability Office to offer actionable information about contracting in war zones.

Tags: Paul Francis , GAO , Commission on Wartime Contracting in Iraq and Afgh , contracting , acquisition ,

Thursday - 04/28/2011, 05:58pm EDT

Analysis: Panetta, Petraeus both 'confirmable' in new roles

Mackenzie Eaglen of the Heritage Foundation is here to offer some insight on the DoD-CIA swapping.

Tags: Mackenzie Eaglen , Heritage Foundation , Leon Panetta , David Petaeus , DoD , CIA ,

Wednesday - 04/27/2011, 08:15pm EDT

DoD readies to implement telework act

Pat Tamburrino is DoD's Chief Human Capital Officer. He's my guest to discuss how things are going for the Defense Department.

Tags: Pat Tamburrino , DoD , telework ,

Wednesday - 04/27/2011, 06:18pm EDT

Pentagon Solutions: Getting the right equipment to the warfighter

Command Sergeant Major Bernard C. McPherson, command sergeant major of PEO Soldier, explains how budget cuts will affect his organization's ability to fund research and development for the equipment needed by troops.

Tags: Bernard C. McPherson , Army , Program Executive Office Soldier ,

Wednesday - 04/27/2011, 04:55pm EDT

Agency performance - Are you overmeasured?

Some people think the agencies are "measured enough"and some think your agency is overmeasured.

Tags: Jon Desenberg , Performance Institute , accountability ,

Wednesday - 04/27/2011, 04:38pm EDT

Cyber focus shifts from hardware to software

The government's approach to cybersecurity is shifting from the historical emphasis on the hardware and network layers to a focus on securing software. The National Defense Authorization Act represents this change.

Tags: Bob Lentz , Kelly Collins , Fortify Corporation , Cybersecurity Update , technology , ational Defense Authorization Act

Wednesday - 04/27/2011, 03:57pm EDT

Cautionary tale of Amazon's cloud crash

The recent crash of Amazon's cloud computing services has left a dark spot in the minds of some feds and contractors.

Tags: Michael Fox , Carpathia , Amazon , cloud computing , technology ,

Wednesday - 04/27/2011, 03:44pm EDT

Open gov lessons from GSA

Martha Dorris, deputy associate administrator of the Office of Citizen Services at the General Services Administration, explains how her agency has used e-gov initiatives to improve the customer experience.

Tags: Martha Dorris , GSA , open government , technology ,

Tuesday - 04/26/2011, 06:25pm EDT

How to bounce back from a cyber attack

Barbara Penland of the Oak Ridge Lab's communications office shares how the lab is getting back to normal after its systems were hacked.

Tags: Cybersecurity Update , technology , Barbara Penland , Oak Ridge National Laboratory , hacker ,

Tuesday - 04/26/2011, 04:33pm EDT
  • 239