Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: NSA
There is a new alliance in the battle for cybersecurity. Though neither side has confirmed it, The Washington Post recently reported that Google has asked the NSA to help investigate the mid-December cyber attack against its networks "to better defend Google - and its users - from future attack." This partnership demonstrates the increasing interdependencies between the public and private sector in defending against cyber threats.
Information Assurance Director
Sept. 3, 2009
The National Security Agency is the big question mark for the Obama administration's new cyber security strategy. Specifically, what should NSA's role be? The spy agency, by all accounts, has the best technology and know-how for monitoring cyber space. But critics fear its ability to conduct domestic surveillance. Even as the administration releases its new strategy, expect this debate to continue. I'm Tom Temin.
CIO Council offers advice on improving agency input on IT security
The guidelines, issued Monday by public and private sector cybersecurity experts, are considered the low-hanging fruit to help agencies improve their network security immediately, says John Gilligan, a former Air Force and Energy Department chief information officer.
Principal Engineer, Praxis High Integrity Systems and developer of Tokenner
Robert Dewar, President of AdaCore
Higher stage of maturity is necessary to secure systems