Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: security
A new report from the Government Accountability Office fueled a House subcommittee hearing that revealed security concerns regarding the training and certification of contract guards employed by the Federal Protective Service.
Mark Goodge, the chief technology officer of the Military Health System, said the agency is putting the right frameworks and policies in place to enable a more robust computing environment where patients and health care providers can take advantage of smartphones and tablets. With 9.6 million people under its care, Goodge said MHS's number one priority is security.
Rick "Ozzie" Nelson, director of homeland security and counterterrorism at the Center for Strategic and International Studies, ponders the TSA's evolving role in keeping the transportation system secure.
An Italian judge found 23 Americans and two Italians guilty in the kidnapping of an Egyptian terror suspect, delivering the first legal convictions anywhere in the world against people involved in the CIA's extraordinary renditions program.
U.S. officials think he's 100% dead but they don't have any proof.
DoD announces $52.5 million in grants
If the lock to your house required special training to work, you'd be more likely to take your chances and leave the place unlocked. That's how it is with cyber security. If security procedures and systems are too complicated, users tend to skip them. But research at the National Institute of Standards and Technology is establishing a link between usability and security and will make the results available this summer to federal agencies.
Uh oh. It's happened again. A hard drive containing a terabyte of personally identifiable information has gone missing. It disappeared from a lab desk inside the National Archives in College Park, Maryland. The disk housed social security numbers of Clinton White House visitors and of the Gore family. Once again proving that the insider threat is as potent as any attack launched from overseas. I'm Tom Temin.