Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: NIST
The Defense Information Systems Agency created a Defense-wide directory of email addresses in support of their enterprise email system. But the real value in the listing of every military and civilian employee, contractor and retiree email address may be in securing information in a new way through the use of access based identity management. NIST is testing how to best use secure identity cards in the cloud.
Tags: technology , Alfred Rivera , DISA , Donna Dodson , cloud computing , Army , enterprise email , identity management , HSPD-12 , Common Access Card , cybersecurity , DoD , information sharing , Jason Miller
New guidance puts the onus on your agency to secure its presence in the public cloud.
New guidance on public cloud computing puts the emphasis on the consumer in protecting privacy and security.
The White House will push Congress to "finish the job" on spectrum policy, Chief Technology Officer Aneesh Chopra said. First responders still are using analog communications to talk to each other during emergencies.
An analysis by the American Association for the Advancement of Science found the 2012 budget for research and development will make investments into energy and environment research and cut R&D at the Defense Department and NASA.
The Joint Authorization Board releases specific requirements around each of the security controls for FedRAMP for systems needing low and moderate security levels. GSA and IAC will hold an industry day Wednesday.
NIST says it wants to head off a threat that could lead to more sophisticated attacks on organizations.
Chuck Romine took over at the Information Technology Laboratory at NIST about a month ago.
Join thought leaders from Department of Homeland Security, Government Accountability Office, National Institute of Standards and Technology and Noblis as they discuss future Science and Technology innovation for first responders. This Noblis Insights Panel is titled "Can Innovation Survive Budget Cuts?" In today's budget-constrained environment, how can government agencies do more with fewer resources?
Agencies, vendors can comment until Friday on the draft standard describing cybersecurity workers. A common definition will help agencies classify who is a cyber worker.