The Application Security Advisory Board was established to recommend ways to create awareness about the problem of insecure software and help organizations infuse security into the software development lifecycle. Boardmember Hart Rossman explains how it works.
Former Virginia Congressman Tom Davis said federal employees are on the chopping block because they are easy prey. Davis, now a director with Deloitte and Touche, said a letter from the Washington-D.C. area delegation could impact the potential two-year pay freeze the White House is proposing. The eight House members say feds are being targeted unfairly to help reduce the deficit.
The Department of Homeland Security gets more Freedom of Information Act requests than any other agency. It\'s now assembling a new set of processes that will centralize requests by individuals who want to know what data the agency is storing about them.
Loopholes in the global aviation system beyond the control of the Homeland Security Department are stymieing steps to bolster screening, several federal officials told lawmakers.
This week, host Larry Allen speaks with Carrie Coogan, vice president of consulting for FedSources, about challenges confronting those entering the federal market. December 7, 2010 (Encore Presentation)
Federal workers are now prohibited from downloading WikiLeaks cables. That’s the official announcement from the Office of Management and Budget. The rationale? Even though they are leaked, the messages are still classified. Does this strategy…
But who will certify the certifiers? We get a feel for how Health IT certification works from HHS\'s Dr. Doug Fridsma.
Contract Connections will feature National institutes of Health (NIH), NASA Goddard Space Flight Center, Nuclear Regulatory Commission, Social Security Administration and other federal agencies, as well as the Naval Air Systems Command, Defense Information Systems Agency (DISA) and other military commands. Maryland\'s Lisa Swoboda has details.
\"(P)erhaps the lesson of Wikileaks should be that the open air is less fearsome than we\'d thought. That should lead to less secrecy. After all, the only sure defense against leaks is transparency,\" says Prof. Jeff Jarvis. He joins us to talk about it.
The Defense Department employs about 45,000 workers with disabilities, but needs to boost awareness of a program to support, hire and retain them says Stephen M. King. The DOD\'s director of disability programs joins us to tell us how he plans to do that.
Bid protests are up, which means so is the workload at GAO. The Government Accountability Office\'s Ralph White explains what\'s involved.
\"We want to protect the end user and we don\'t want them to care if it was antivirus or personal firewall; you want to protect them in a broader scheme,\" says ISCA Labs.
The Pentagon, even while looking for ways to trim the budget and reduce deficit pressure, tells contractors profit margins should stay intact. We get details from Jim McAleese.
A bill passed by the U.S. Senate requires the Army to report whether graves at Arlington National Cemetery are correctly marked and come up with a plan to fix any errors that are found.
December 6th and December 8th, 2010 Join us for a conversation with government technology leaders on the intersection of technology and government mission.