Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: security
Pres. Obama will try to sell a skeptical public on his bigger, costlier war plan Tuesday by coupling the large new troop infusion with an emphasis on stepped-up training for Afghan forces that he says will allow the U.S. to leave.
The Defense Department is looking for the same benefits from RFID as Wal-Mart.
More Cyber acumen coupled with new cultural sensitivity across all levels of federal agencies is needed.
Narco-traffickers have found a new source of profit. Current and former U.S. government officials say they're helping international terrorists try to penetrate the U.S. borders.
Despite increased animosity and even attack, federal employees want to get the mission accomplished. Things will calm down, but feds can take action now to protect themselves from further attack.
National Security Correspondent JJ Green speaks with Army Reserve Lt. Col. Tony Shaffer, who explains the strategy the US has been using against Taliban.