Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
In an effort to provide a better environment for commenting, we have changed our comment platform. In order to comment on a story, you will first need to create a Disqus account if you do not already have one. It's easy! Sign up for an account below by clicking in the "Leave a message" field and then clicking on the blue Disqus icon. Alternatively, you can now comment using your Facebook, Twitter or Google accounts.
Federal News Radio understands how important anonymity is to some commenters. Like our previous platform, our new system allows users to identify their comments with a screen name (instead of their first and last name) if they so choose. Find more information about creating a screen name and other frequently asked questions about Disqus here.
Our comment policy itself has not changed. Federal News Radio encourages users to express their opinions by posting comments that have a positive and constructive tone; are on topic, clear and to-the-point; and are respectful towards others and their opinions. Our goal is to maintain a civil dialogue in which readers feel comfortable. Federal News Radio reserves the right to remove comments and block users that do not follow these criteria.comments powered by Disqus
Defense Intelligence Agency chief Lt. Gen. Michael Flynn told the House Intelligence Committee that his agency has to assume that former National Security Agency analyst Edward Snowden took every document he accessed, and that much of it concerned Pentagon programs.
Navy admiral is Obama's choice to take reins of troubled NSA and US Cyber Command
An interagency review group determined having one leader for both organizations makes the most sense to get the mission done.
A pilot project is part of NSA's push to layer commercial technologies and standards on top of one another to achieve security goals more quickly. This approach would replace the government-specific IT solutions that can take years and millions of dollars to develop.
Obama administration considers splitting command of National Security Agency and cybersecurity
Despite progress by some agencies in processing FOIA requests, Patrice McDermott of OpenTheGovernment.org says its difficult to measure how open the government really is.
Gen. Keith Alexander, head of the U.S. Cyber Command and the National Security Agency, said the greatest impact of the ongoing government shutdown on cybersecurity is on the morale of the cyber workforce.
Rep. Dutch Ruppersberger (D-Md.), ranking member of the House Intelligence Committee said the longer we wait on cybersecurity legislation, the worse it gets for cyber attacks on the U.S.
The bill would conform, mostly, with the House's most recent Cyber Intelligence Sharing and Protection Act. Both the House and Senate bills are trying to find common areas to incentivize private sector companies to share information on any malicious code their firms encounter, both by providing them with liability protections that would shield them from lawsuits that could otherwise follow from sharing information with competitors or with the government, and by convincing them that federal agencies are capable of securely communicating threat information between the private and public sectors.
While the threat of a Sept. 11-style attack may not be as great, terrorism, either of the lone-wolf or state-sponsored variety, still poses a threat to the U.S. Agencies are moving to protect themselves in areas such as cybersecurity.
The Office of the Director of National Intelligence said the lead agencies under the IC IT Enterprise program launched a standard desktop, a secure community cloud and an apps store in mid-August. Al Tarasiuk, the assistant DNI and intelligence community chief information officer, said the key to this effort was having an ICwide agreed-upon security architecture and policies.
The National Security Agency on Thursday disputed a published report that secret intelligence budget files provided by agency leaker Edward Snowden show that the surveillance agency warned in 2012 that it planned to investigate up to 4,000 cases of possible internal security breaches.
President Barack Obama is directing his national intelligence director to form a panel of outside experts to review government intelligence and communications technologies
The Privacy and Civil Liberties Oversight Board is responsible for investigating the balance between counterterrorism security and Americans' privacy. The board is working toward a report on the National Security Agency's surveillance programs.
The Rules Committee voted late Monday to allow the House to begin voting on NSA amendments. The amendments cut funds for surveillance programs and impose limits on their operations.
Evan Lesser, founder and director of ClearanceJobs.com, discusses the potential impact of the NSA security leaks.
June 21, 2013
Obama meets with privacy and civil liberties panel that oversees anti-terror programs
Watchdog says contractor that performed background check of NSA leaker under investigation
On this week's Capital Impact show, Bloomberg Government analysts will discuss how U.S. providers are being affected by the NSA Survelliance controversy, and the impact of the Affordable Care Act.
June 20, 2013
Intelligence community contractors, similar to Booz Allen, likely are reevaluating employees who have access to classified information in order to identify any questionable personnel, according to Steve Ryan, leader of government strategies practice group at McDermott, Will and Emery law firm.