Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: WikiLeaks
The New York Times, Daily Beast and other publications report on how agencies and contractors are responding to the WikiLeaks released of classified documents.
The BBC reports that Chinese officials orchestrated the hacking at Google earlier this year, according to WikiLeaks cables.
Federal employees are being warned not to look at documents leaked by WikiLeaks website,
Congress is now expected to pass whistleblower legislation that would give employees in the intelligence community a way to report corruption and waste. Attorney Debra Roth explains the ramifications.
"Open" isn't always "better."
What if there's more than one source for Wikileaks?
In the wake of the WikiLeaks release, the Pentagon is taking steps to better secure its information. Gordon Lubold, a reporter for Politico, brings us the details.
The military has assembled a team of 120 people to respond to the publication of about 400,000 documents related to the Iraq war effort in expectation that whistle-blower website WikiLeaks
No U.S. intelligence sources or practices were compromised by the posting of secret Afghan war logs by the WikiLeaks website, the Pentagon has concluded, but the military thinks the leaks could still cause significant damage to U.S. security interests.