Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: NIST
An updated how-to guidance for responding to cyber incidents is out.
The National Institute of Standards and Technology is making it easier for agencies to test the use of logical access control for applications.
The General Services Administration will hold a vendor day Aug. 7 in Washington, D.C. The concept of identity management in the cloud builds on the efforts included in the National Strategy for Trusted Identities in Cyberspace (NSTIC).
The National Institute of Standards and Technology has released a new draft of its biometric identification standards.
New guidelines could help agencies adopting bring-your-own-device strategies manage the potential risks smartphones and tablets could pose.
How is the government using big data currently?
On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.
Christopher Fountain, senior vice president of SecureInfo joins host John Gilroy to talk about IT security.
July 10, 2012
The agency will hold a workshop July 25 to review the second draft of FIPS 201-2.
The Postal Service's E-Access system helps control employee access to systems and data. The single sign-on environment lets managers and database owners assign privileges to employees based on need.