Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: security
Quite a number of insider threat incidents have happened because basic security principles were absent, overlooked or ignored. Why Jim Henderson says it's time we get back to the basics.
A new report from the Government Accountability Office suggests the Department of Homeland Security and the Office of Management and Budget need to take a more active role in monitoring and guiding small agencies when it comes to their security and privacy-protection programs.
Terrorists in the Middle East are using weapons, supplies, and even new technology made in the United States in their attacks on Iraqi cities and elsewhere. David Olive is a principal of Catalyst Partners and a writer for the Security Debrief blog. He said on In Depth with Francis Rose, they're even using a brand new drug the Food and Drug Administration just approved for military use in April, and it's calling into question the security of the military supply chain.
GSA Office of Government-wide Policy Chief of Staff Stephanie Rivera discusses efforts to create a standardized operating process for all agencies, and the challenges and opportunities that go along with it.
Although it dates back to World War II, Sandia National Labs continues to make important contributions to national security today. Sandia's research and development aid the Pentagon in its nuclear mission and civilian agencies in energy, climate and infrastructure security. Julia Phillips, vice president and chief technology officer of Sandia National Laboratories, discussed Sandia's research agenda with Federal Drive hosts Tom Temin and Emily Kopp.
The Department of Defense provided Congress on Wednesday the April 2014 "Report on Progress Toward Security and Stability in Afghanistan". It says although the Afghani security forces continue to make progress, four key high-end capability gaps will remain after the International Security Assistance Force (ISAF) mission ends on Dec. 31, 2014: air support, intelligence enterprise, special operations, and Afghan security ministry capacity. International funding and coalition force assistance will be critical to sustaining the force going forward.
The White House has a government-wide security plan to prevent another Navy Yard Shooting.
With public trust and safety at stake, Defense Secretary Chuck Hagel ordered immediate actions Thursday to define the depth of trouble inside the nation's nuclear force, which has been rocked by disclosures about security lapses, poor discipline, weak morale and other problems that raise questions about nuclear security.
A new report from the Government Accountability Office fueled a House subcommittee hearing that revealed security concerns regarding the training and certification of contract guards employed by the Federal Protective Service.
Mark Goodge, the chief technology officer of the Military Health System, said the agency is putting the right frameworks and policies in place to enable a more robust computing environment where patients and health care providers can take advantage of smartphones and tablets. With 9.6 million people under its care, Goodge said MHS's number one priority is security.