Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: cybersecurity
Wired and GCN report that cyber attacks have decreased but the actual risk of attacks may not be decreasing.
Mac computers are not immune anymore. A new malware attack on the popular operating system.
Booz Allen Hamilton is partnering with the University of Maryland University College to provide three online graduate certifications in cybersecurity.
Mobile phones are more like computers than ever before.
October 27th, 2010
Representative Jim Langevin of Rhode Island and the Honorable Tom Davis discuss the reform of the 2002 Federal Information Security Management Act (FISMA) and the pending Congressional Cybersecurity bills.
DHS CIO Richard Spires doesn't have anything against contractors, but he wants more feds and fewer contractors in his IT shop.
Venable's Rob Burton and Federal News Radio's Jason Miller count down their choices for the three most important Federal news stories of the week.
A hacking competition seeks to find coders who can break the system and then recruit them to cyber security.
Congress is slated to return for a lame duck session two weeks after next Tuesday's elections, but no action is expected until January at the earliest.
Host Tom Temin discusses the Navy's cybersecurity recruiting process with Kevin Cooley, the command information officer at the Navy Cyber Command.
October 28, 2010