Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
Search Tags: WikiLeaks
The New York Times, Daily Beast and other publications report on how agencies and contractors are responding to the WikiLeaks released of classified documents.
The BBC reports that Chinese officials orchestrated the hacking at Google earlier this year, according to WikiLeaks cables.
Federal employees are being warned not to look at documents leaked by WikiLeaks website,
Congress is now expected to pass whistleblower legislation that would give employees in the intelligence community a way to report corruption and waste. Attorney Debra Roth explains the ramifications.
"Open" isn't always "better."
What if there's more than one source for Wikileaks?
In the wake of the WikiLeaks release, the Pentagon is taking steps to better secure its information. Gordon Lubold, a reporter for Politico, brings us the details.
The military has assembled a team of 120 people to respond to the publication of about 400,000 documents related to the Iraq war effort in expectation that whistle-blower website WikiLeaks
No U.S. intelligence sources or practices were compromised by the posting of secret Afghan war logs by the WikiLeaks website, the Pentagon has concluded, but the military thinks the leaks could still cause significant damage to U.S. security interests.