Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: privacy
Facebook is moving the boundaries of privacy again, with plans to give third-party developers permission to ask social network users for their home addresses and phone numbers.
Gen. Keith Alexander, commander of the military's new Cyber Command and the director of the NSA, said DoD can help protect private networks from cyber attack - especially critical infrastructure - without infringing on civil liberties. He said civilian agencies and private network operators could leverage NSA's capabilities without having the spy agency be in charge of security.
Tags: DoD , cybersecurity , technology , Keith Alexander , U.S. Cyber Command , NSA , DHS , Do William Lynn , civil liberties , Information Technology Exchange Program , industry , information sharing , Jared Serbu
The agency's monthly security report to Congress continues to show a decreasing severity of data breaches.
Many genuine blogs have been blocked/removed as they were considered to be spam blogs.
The Defense Department continues to scrub service members' social security numbers from public DoD websites. The armed services plan to transition to an alternative ID number system by 2012.
Best of interview with TSA Administrator John Pistole shortly after he joined the agency.
Assistant secretary Baker said he can't let doctors store veterans' data on unsecured systems in the cloud. But Baker said he wants to figure out how to solve this problem because the ability to access data anywhere, anytime is necessary. VA shutdown facilities usage of common commercial cloud applications.
CTO Aneesh Chopra said 2010 was the year of execution for the open government initiative.
The New York Times, Daily Beast and other publications report on how agencies and contractors are responding to the WikiLeaks released of classified documents.