bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
5:14 am, May 30, 2015

Search Result

Search Tags:  technology

Continuous Monitoring? Been there, doing that

This week, Federal Security Spotlight talks with John Streufert of the State Department.
June 10, 2010

Tags: Technology , Federal Security Spotlight , State , John Streufert , Cybersecurity , Tom Temin

Tuesday - 06/08/2010, 06:03pm EDT
Listen

State Department using social media to meet mission

Diplomats need to work with the under-30 age group that is using Internet-based communication technology, State's Jared Cohen says.

Tags: In Depth , Francis Rose , management , Technology , Jared Cohen , Hillary Clinton , State , Oglivy , Web 2.0 , social media , Jason Miller

Tuesday - 06/08/2010, 07:24pm EDT
Listen

DHS's Marshall: Supply chain management vital

The challenge of securing the nation's IT infrastructure has often been likened to building an airplane as it flies through the air -- or even herding cats.

Tags: In Depth , Francis Rose , Technology , Cybersecurity , DHS , Richard Marshall , National Cybersecurity Division , ISC2 , FBI , HP , Electronic Data Systems , Howard Schmidt , Barack Obama , Max Cacas

Tuesday - 06/08/2010, 07:09pm EDT
Listen

Analyst accused of leaking classified information

Bradley Manning was detained during a tour of duty in Iraq.

Tags: Technology , Cybersecurity , Cybersecurity Update , DorobekInsider

Tuesday - 06/08/2010, 05:08pm EDT

Smartphones Could Replace Hospital PAs

Tags: Technology , Health IT , smartphones

Tuesday - 06/08/2010, 04:01pm EDT

IT Service Management and enterprise architecture

This week, host John Gilroy talks about IT Service Management and Information Technology Infrastructure Library with DISA's Drew Jaehnig and CSC's Wendy Irion-Talbot.
June 8, 2010

Tags: Technology , Federal Tech Talk , DISA , Drew Jaehnig , Wendy Irion-Talbot , CSC , IT Service Management , Information Technology Infrastructure Library

Tuesday - 06/08/2010, 12:33pm EDT
Listen

Pradeep Sindhu: Combine innovation and automation

Agencies are under pressure to cut costs while delivering more customer service. Juniper Networks' Pradeep Sindhu says it really can be done.

Tags: Federal Drive , Technology , Juniper Networks , Pradeep Sindhu , innovation , enterprise IT networks , contracting

Tuesday - 06/08/2010, 10:40am EDT
Listen

What Will CYBERCOM'S Mission Be?

The U.S. Cyber Command - or CYBERCOM - officially became operational in late May. But observers inside the military and out still aren't sure what the command is supposed to do: protect the Pentagon's networks, strike out at enemies, seal up civilian vulnerabilities, or some combination of all three. CYBERCOM officials insist they have no interest in taking over the security of the Internet, but Pentagon officials have floated the idea the Defense Department might start a protective program for civilian networks.

Tags: Technology , Cybersecurity Report , Cybersecurity , U.S.Cyber Command , CYBERCOM , Pentagon , DoD , Scott Carr

Monday - 06/07/2010, 09:00pm EDT

CERT Releases New Fuzz Tester

Carnegie Mellon University's Computer Emergency Response Team (or CERT) has released a new fuzzing framework that will help identify and eliminate security vulnerabilities from different kinds of software. The fuzz testers are used by security researchers to find vulnerabilities by sending random input to an application. Fuzz testing has been popular among hackers, but with the release of this framework, CERT can push businesses to subject all software to fuzz testing.

Tags: Technology , Cybersecurity Reports , Cybersecurity , CERT , Scott Carr

Monday - 06/07/2010, 08:58pm EDT

Secure Flight Program Checking Air

Department of Homeland Security officials say 100 percent of passengers traveling in the U.S. and its territories are now being checked against terrorist watchlists through the Transportation Security Administration's Secure Flight program - a major step in fulfilling a key 9/11 Commission recommendation. Secure Flight enables TSA to screen passengers directly against government watchlists using passenger's names, their date of birth, and gender before a boarding pass is issued. In addition to facilitating secure travel for all passengers, the program helps prevent the misidentification of passengers who have names similar to individuals on government watchlists. Officials say 99 percent of passengers will be cleared by Secure Flight to print boarding passes at home by providing their date of birth, gender and name as it appears on the government ID they plan to use when traveling.

Tags: Technology , Meeting Mission Goals Through Technology , DHS , TSA , Scott Carr

Monday - 06/07/2010, 08:50pm EDT
  •  
  • 600
  •