Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
In an effort to provide a better environment for commenting, we have changed our comment platform. In order to comment on a story, you will first need to create a Disqus account if you do not already have one. It's easy! Sign up for an account below by clicking in the "Leave a message" field and then clicking on the blue Disqus icon. Alternatively, you can now comment using your Facebook, Twitter or Google accounts.
Federal News Radio understands how important anonymity is to some commenters. Like our previous platform, our new system allows users to identify their comments with a screen name (instead of their first and last name) if they so choose. Find more information about creating a screen name and other frequently asked questions about Disqus here.
Our comment policy itself has not changed. Federal News Radio encourages users to express their opinions by posting comments that have a positive and constructive tone; are on topic, clear and to-the-point; and are respectful towards others and their opinions. Our goal is to maintain a civil dialogue in which readers feel comfortable. Federal News Radio reserves the right to remove comments and block users that do not follow these criteria.comments powered by Disqus
A pilot project is part of NSA's push to layer commercial technologies and standards on top of one another to achieve security goals more quickly. This approach would replace the government-specific IT solutions that can take years and millions of dollars to develop.
Obama administration considers splitting command of National Security Agency and cybersecurity
Despite progress by some agencies in processing FOIA requests, Patrice McDermott of OpenTheGovernment.org says its difficult to measure how open the government really is.
Gen. Keith Alexander, head of the U.S. Cyber Command and the National Security Agency, said the greatest impact of the ongoing government shutdown on cybersecurity is on the morale of the cyber workforce.
Rep. Dutch Ruppersberger (D-Md.), ranking member of the House Intelligence Committee said the longer we wait on cybersecurity legislation, the worse it gets for cyber attacks on the U.S.
The bill would conform, mostly, with the House's most recent Cyber Intelligence Sharing and Protection Act. Both the House and Senate bills are trying to find common areas to incentivize private sector companies to share information on any malicious code their firms encounter, both by providing them with liability protections that would shield them from lawsuits that could otherwise follow from sharing information with competitors or with the government, and by convincing them that federal agencies are capable of securely communicating threat information between the private and public sectors.
While the threat of a Sept. 11-style attack may not be as great, terrorism, either of the lone-wolf or state-sponsored variety, still poses a threat to the U.S. Agencies are moving to protect themselves in areas such as cybersecurity.
The Office of the Director of National Intelligence said the lead agencies under the IC IT Enterprise program launched a standard desktop, a secure community cloud and an apps store in mid-August. Al Tarasiuk, the assistant DNI and intelligence community chief information officer, said the key to this effort was having an ICwide agreed-upon security architecture and policies.
The National Security Agency on Thursday disputed a published report that secret intelligence budget files provided by agency leaker Edward Snowden show that the surveillance agency warned in 2012 that it planned to investigate up to 4,000 cases of possible internal security breaches.
President Barack Obama is directing his national intelligence director to form a panel of outside experts to review government intelligence and communications technologies
The Privacy and Civil Liberties Oversight Board is responsible for investigating the balance between counterterrorism security and Americans' privacy. The board is working toward a report on the National Security Agency's surveillance programs.
The Rules Committee voted late Monday to allow the House to begin voting on NSA amendments. The amendments cut funds for surveillance programs and impose limits on their operations.
Evan Lesser, founder and director of ClearanceJobs.com, discusses the potential impact of the NSA security leaks.
June 21, 2013
Obama meets with privacy and civil liberties panel that oversees anti-terror programs
Watchdog says contractor that performed background check of NSA leaker under investigation
On this week's Capital Impact show, Bloomberg Government analysts will discuss how U.S. providers are being affected by the NSA Survelliance controversy, and the impact of the Affordable Care Act.
June 20, 2013
Intelligence community contractors, similar to Booz Allen, likely are reevaluating employees who have access to classified information in order to identify any questionable personnel, according to Steve Ryan, leader of government strategies practice group at McDermott, Will and Emery law firm.
Government contractors with security clearances, such as Edward Snowden, aren't legally protected from whistleblowing even by going through the proper channels. But John Mahoney, of the law firm Tully Rinckey, said Snowden should have defaulted to the standard whistleblowing procedure used by government employees in the intelligence community, who are protected under the law.
In the wake of the NSA security leak, questions are being raised about the security clearance process for which Edward Snowden was subjected. One security clearance expert tells Federal News Radio, that while the process for granting security clearances has become more efficient over the past few years, it has not become more effective.
NSA director says surveillance programs disrupted dozens of terrorist attacks