Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Technology
After separating from Fannie Mae, an employee continued to use administrator credentials to make unauthorized changes to the CheckMyNPV website.
Although cutbacks in training and travel normally create challenges, Immigration and Customs Enforcement's Student and Exchange Visitor Program is benefiting from its money-saving transition to online conferencing.
The Defense Department has some significant blind spots when it comes to its ability to assess what's going on in the global technology landscape -- especially in the commercial and non-defense markets. DoD officials are keenly aware of the problem, and there's a nascent effort underway to help solve it. The new Technology Domain Awareness initiative is a project of DoD's Information Analysis Centers. Christopher Zember is the director of the Information Analysis Centers. And Jay Harrison is the director of the Center for Smart Defense at West Virginia University, which is helping DoD get the TDA effort of the ground. They explained the initial drive behind TDA on In Depth with guest host Jared Serbu.
Chris Carlson, CEO of Retriever Consulting, discusses the benefits of a new aspect of virtualization called containers.
July 15, 2014
Despite steps forward, agencies fell short of their 2014 targets for cybersecurity. The Obama administration is pushing chief information officers to focus on priorities of continuous monitoring, phishing and malware, and authorization processes for 2015, according to the newly released cross-agency priority goals on Performance.gov.
Talent acquisition manager Mike Bruni will discuss how to get a job in what is a competitive and challenging federal market.
July 11, 2014
The General Services Administration's Net-Zero Energy Task Group is planning to produce a draft letter with clear goals and guidance for net-zero energy buildings by this September.
Chinese hackers broke into OPM computer networks earlier this year with the intention of accessing the files of tens of thousands of federal employees who had applied for top-secret security clearances, according to a media report. OPM tells Federal News Radio, "neither OPM nor US-CERT have identified any loss of personally identifiable information."
A new bipartisan report from the Senate's Permanent Subcommittee on Investigations called the Air Force's now-canceled Expeditionary Combat Support System "one of the most egregious examples of mismanagement by the DoD in recent memory." But the failure of ECSS may not be an aberration, the report suggested. Other enterprise-resource planning programs in the department are at risk of falling victim to the same fate.