Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Search Tags: WikiLeaks
Attorney John Mahoney explains the threats to security clearances if you access WikiLeaks.
The nation's No. 2 military officer strongly endorsed the warfighting value of information-sharing.
Thomas McNamara, former program manager for Information Sharing Environment joined Chris Dorobek on The Dorobek Insider.
The New York Times and the Economist report on the U.S. government's ability to keep a secret after the WikiLeaks dumps of classified information.
American Forces Press Service reports that DoD is facing the challenge to share information while keeping some information protected in the wake of WikiLeaks.
The nation's No. 2 military officer on Wednesday strongly endorsed the warfighting value of information-sharing.
"(P)erhaps the lesson of Wikileaks should be that the open air is less fearsome than we'd thought. That should lead to less secrecy. After all, the only sure defense against leaks is transparency," says Prof. Jeff Jarvis. He joins us to talk about it.
The New York Times, Daily Beast and other publications report on how agencies and contractors are responding to the WikiLeaks released of classified documents.
The BBC reports that Chinese officials orchestrated the hacking at Google earlier this year, according to WikiLeaks cables.