Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: Technology
When a Washington based web solution firm received an email from a furloughed fed looking for temporary work, the firm immediately jumped on the idea to create a website with job postings for freelance work. From idea to execution, unfurlough.us was launched in just five hours.
A partnership between the Homeland Security Department and NASA has led to the creation of a new technology called Finding Individuals for Disaster and Emergency Response (FINDER).
Your agency's chief information security officer has a problem that might not have a solution. The online ecosystem of apps and mobile devices is creating a perfect storm of incoming threats and financial challenges. Hord Tipton, executive director of the information security non-profit (ISC)², is the former chief information officer of the Interior Department.
Even though government agencies are in shutdown mode, contractors are still moving ahead in making business decisions. Small businesses are likely to hurt more from the shutdown due to smaller cash reserves and slimmer margins.
The bill would conform, mostly, with the House's most recent Cyber Intelligence Sharing and Protection Act. Both the House and Senate bills are trying to find common areas to incentivize private sector companies to share information on any malicious code their firms encounter, both by providing them with liability protections that would shield them from lawsuits that could otherwise follow from sharing information with competitors or with the government, and by convincing them that federal agencies are capable of securely communicating threat information between the private and public sectors.
Tags: technology , cybersecuirty , Congress , Senate Intelligence Committee , House Intelligence Committee , Mike Rogers , Saxby Chambliss , Dutch Ruppersberger , Keith Alexander , NSA , DHS , Mike McCaul , Jared Serbu
Rep. Dutch Ruppersberger (D-Md.), ranking member of the House Intelligence Committee said the longer we wait on cybersecurity legislation, the worse it gets for cyber attacks on the U.S.
While leaders at CMS said the hub connecting personal information stored in the health insurance marketplace to multiple agencies will be ready by the Oct. 1 deadline, legislators are concerned with how well CMS is securing individuals' personal information from cyber threats.
At a recent health IT demonstration, the Veterans Affairs Department showcased nine different technologies that it hopes will change how it delivers health care. The agency is testing medical mobile apps on iPads with 1,000 severely injured veterans.
Congress approves a $175 million spending package that will let the Army move ahead with plans to consolidate 400 IT security watchtowers down to around a dozen. The cyber initiative is part of broader effort to move the entire DoD toward the Joint Information Environment.
Deron Burba, the Smithsonian's CIO, said the organization will launch 3-D technology this fall to let researchers and others explore digital images like never before.
October 10, 2013