Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Jared Serbu
Faced with declining resources, the Internal Revenue Service has diverted resources from elsewhere inside the agency to try and head off skyrocketing cases of identity theft stemming from tax refunds.
Tags: IRS , Congress , House , House Oversight and Government Reform Commitee , TIGTA , GAO , National Taxpayer Advocate , J. Russell George , Gerry Connolly , Nina Olson , Beth Tucker , James White , technology , cybersecurity ,
Air Force senior leaders assigned themselves several tasks after a summit on cyberspace in mid-November. But the service's role in cyberspace also awaits forthcoming guidance from the military's top leadership on the future of U.S. Cyber Command.
Senators attempt to head off provision in annual Defense bill that would require reductions among Pentagon civilians.
Nancy Hammer, the senior government affairs policy counsel at the Society for Human Resources Management, joins On DoD with Jared Serbu to discuss a new partnership between SHRM and the Army to help military veterans transition out of uniformed service and into the civilian workforce.
USPTO director David Kappos says software is every bit as entitled to patent protection as hardware innovations. Critics of the agency should give recent reforms a chance to work, he told a think tank audience Tuesday.
Gen. William Shelton says some costs for space activities are unsustainable and the service is working to bring them down. But he implored "congressional teammates" not to cut funding for programs that are working.
NSA, DHS taking steps to improve information sharing by creating a set of standardized technical specifications that let machines detect cyber threats and communicate them to one another in real-time. Whole of government approach is starting to take shape when it comes to cybersecurity.
Identity management, standup of Cyber Command, and information sharing with the industrial base have been cited as key cyber accomplishments in the Department of Defense. But much work remains, experts say.
Tags: cybersecurity , technology , Rob Carey , Martin Dempsey , Robert Lentz , Stephen Boutelle , U.S. Cyber Command , defense industrial base , critical infrastructure , NIST , NIST special publication 800-53 Rev 3 , Host Based Security Systems , Cybersecurity Rising
Two brigades of the Army's 10th Mountain Division are training on a ready-to-go set of networking capabilities as they prepare to deploy to Afghanistan. The IT comes out of the Network Integration Evaluation process.
DISA wants a secure mobile device manager and app store to support at least 162,000 Apple and Android mobile devices. Contract would begin next spring.