Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: NSA
Also, most of the malware on federal networks are after money, not intel
But, one columnist argues, it's what's politically possible.
The Defense Department says an investigation has identified dozens of members of the military and defense contractors that have allegedly obtained child pornography. Many of those involved are said to have access to top secret information. Some of those implicated to are connected to the National Reconnaissance Office and the National Security Agency. The Boston Globe first reported the story after obtaining documents through the Freedom of Information Act. Some have already been prosecuted.
Thomas A. Drake could spend the next 35 years in jail.
There are some real concerns coming from several directions over the program.
Boeing to acquire cybersecurity company
Learn more in today's cybersecurity update.
Gen. Keith Alexander calls for the Cyber Command to have real time understanding of what's going on in their computer networks. He also calls for a common operational picture as a part of improving situational awareness. Alexander also says DoD is putting a lot of effort and focus on ensuring privacy and civil liberties laws and regulations are followed.
From NSA to the TSA -- CIO Emma Garrison-Alexander explains her experiences this week on the show.
May 27, 2010
New Cyber Command will better integrate existing and new computer network defense capabilities. DoD right now is spread too thin to protect its 15,000 networks and 7 million computing devices. The military too often is playing catch up to cyber attacks.