Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: privacy
Facebook is moving the boundaries of privacy again, with plans to give third-party developers permission to ask social network users for their home addresses and phone numbers.
Gen. Keith Alexander, commander of the military's new Cyber Command and the director of the NSA, said DoD can help protect private networks from cyber attack - especially critical infrastructure - without infringing on civil liberties. He said civilian agencies and private network operators could leverage NSA's capabilities without having the spy agency be in charge of security.
Tags: DoD , cybersecurity , technology , Keith Alexander , U.S. Cyber Command , NSA , DHS , Do William Lynn , civil liberties , Information Technology Exchange Program , industry , information sharing , Jared Serbu
The agency's monthly security report to Congress continues to show a decreasing severity of data breaches.
Many genuine blogs have been blocked/removed as they were considered to be spam blogs.
The Defense Department continues to scrub service members' social security numbers from public DoD websites. The armed services plan to transition to an alternative ID number system by 2012.
Best of interview with TSA Administrator John Pistole shortly after he joined the agency.
Assistant secretary Baker said he can't let doctors store veterans' data on unsecured systems in the cloud. But Baker said he wants to figure out how to solve this problem because the ability to access data anywhere, anytime is necessary. VA shutdown facilities usage of common commercial cloud applications.
CTO Aneesh Chopra said 2010 was the year of execution for the open government initiative.
The New York Times, Daily Beast and other publications report on how agencies and contractors are responding to the WikiLeaks released of classified documents.