Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: information security
Congressional report points to misuse of TSA's "sensitive security information" designation for unclassified agency data.
Documents obtained by Federal News Radio show VA's financial audit found material weaknesses, including the failure to remove terminated employees from accessing the network, and the lack of a formal process for monitoring, preventing installation and removing unauthorized application software on agency systems. House Veterans Affairs lawmakers continue to press VA to make changes to their cybersecurity posture more quickly. VA officials say they have a multi-layered defense to include outside network monitoring by external partners, active scanning of Web applications and source code, and protection of servers, workstations, network and gateways, among other security efforts.
The Veterans Affairs Department denies claims that systems or data are in danger. But Jerry Davis, the former deputy assistant secretary for information security in VA's Office of Information and Technology, asserts in documents that he was bullied into signing security certifications that were deficient as a condition of his departure from VA for a new job at NASA.
Tags: exclusive , technology , cybersecurity , management , VA , Jerry Davis , Stephen Warren , Roger Baker , Mike Michaud , House Veterans Affairs Committee , Senate Veterans Affairs Committee , Jason Miller , veterans ,
Rick Kerestesy and Doug Berry from the Ambit Group discuss how federal CIO's can effectively enact and manage change.
March 22, 2013
Are you a federal manager? Then you need these 13 tips for managing the new crop of teleworkers in your office.
The commissioner of the Internal Revenue Service offered a public apology Thursday to taxpayers who have had their names and social security numbers used to claim fraudulent refunds. The IRS is working to strengthen its internal controls to prevent it from issuing such refunds in the future.
Information Security reports that a security expert says the Air Force ban of thumb drives will not solve the problem of how to prevent classified leaks, such as in the WikiLeaks incident.