Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: WikiLeaks
Army Private Bradley Manning apologizes for giving classified documents to WikiLeaks. His sentencing hearing is raising questions about Army commanders' ability to spot mental health issues.
The court-martial of a U.S. Army private who gave troves of classified material to the website WikiLeaks is shifting in its second week to specific items he sent.
An Army private charged in the biggest leak of classified material in U.S. history is set to tell a military judge how he did it and why.
President Barack Obama has issued new agency standards for protecting classified information from insider threats. In a Presidential Memorandum issued Wednesday, Obama provided the heads of executive branch departments and agencies the new National Insider Threat Policy as well as the minimum standards to be employed by each agency in standing up its own insider-threat programs. Details on the new policy and the standards were not made public.
The Information Sharing Environment is supporting a set of technology priories to promote the safe disclosure of data. In the ISE's annual report to Congress, it highlights the steps agencies have taken over the past year to move toward a culture of responsible and secure information sharing.
Tags: technology , management , Kshemendra Paul , Information Sharing Environment , information sharing , ODNI , Insider Threat Strategy , National Strategy for Infomation Sharing , NIEM , Supicious Activity Reporting standard , Jason Miller , FICAM , identity management
ikileaks founder Julian Assange portrayed himself Sunday as a victim of an American "witch hunt."
Anti-Leaks launched its attack just as Wikileaks began releasing information on a secret government surveillance program, Government Computer News reports.
The secret-busting organization WikiLeaks says it's been the victim of a sustained denial-of-service attack which has left its website sluggish or inaccessible for more than a week.
The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.
Tags: technology , management , ODNI , FBI , Gordon Snow , John Swift , Rob Carey , DoD , Diana Braun , Insider Threat Task Force , White House , HSPD 12 , secure identity card , identity management , PKI , information sharing , insider threat , FOSE , Jason Miller