Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: security
Uh oh. It's happened again. A hard drive containing a terabyte of personally identifiable information has gone missing. It disappeared from a lab desk inside the National Archives in College Park, Maryland. The disk housed social security numbers of Clinton White House visitors and of the Gore family. Once again proving that the insider threat is as potent as any attack launched from overseas. I'm Tom Temin.
A House Democratic leader says he thinks lawmakers will be taking precautions when meeting with the public in the wake of a congresswoman's shooting in Arizona.
Homeland Security Today editor David Silverberg has more.
The Pentagon is in the process of a "complete reinvention" of security.
WFED's Jason Miller reports.
Since Christmas Day attack attempt, office has been forced to deal quickly with issues.
Mexican drug cartels are infiltrating federal law enforcement agencies along the southwest border and those charged with weeding them out say they don't have the money to catch all the corrupt agents, homeland security officials told a U.S. Senate panel Thursday.
The U.S. Air Force has awarded IBM a contract to design and demonstrate a secure cloud computing infrastructure capable of supporting defense and intelligence networks.
On the face of it, it seems like a simple question: How many contractors work for the Department of Homeland Security? And in fact, a top Senate subcommittee chair, whose panel oversees government contracting only got a spreadsheet with a statistical estimate of the number of DHS contractors working in the area. A representative from one of the top trade groups representing the federal contracting industry offers some analysis.