Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: WikiLeaks
The New York Times, Daily Beast and other publications report on how agencies and contractors are responding to the WikiLeaks released of classified documents.
The BBC reports that Chinese officials orchestrated the hacking at Google earlier this year, according to WikiLeaks cables.
Federal employees are being warned not to look at documents leaked by WikiLeaks website,
Congress is now expected to pass whistleblower legislation that would give employees in the intelligence community a way to report corruption and waste. Attorney Debra Roth explains the ramifications.
"Open" isn't always "better."
What if there's more than one source for Wikileaks?
In the wake of the WikiLeaks release, the Pentagon is taking steps to better secure its information. Gordon Lubold, a reporter for Politico, brings us the details.
The military has assembled a team of 120 people to respond to the publication of about 400,000 documents related to the Iraq war effort in expectation that whistle-blower website WikiLeaks
No U.S. intelligence sources or practices were compromised by the posting of secret Afghan war logs by the WikiLeaks website, the Pentagon has concluded, but the military thinks the leaks could still cause significant damage to U.S. security interests.