Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
The Centers for Medicare and Medicaid Services are exploring how they can use some of the technology used by credit card companies to cut down on fraud, by stopping improper payments before they happen. The agency plans to use money from the Small Business Jobs bill to test out technology known as predictive modeling. Banks use it to detect transactions that don\'t mesh up with a card holder\'s typical spending patterns. CMS thinks it might be a way to stop improper payments beforehand - rather than chasing down fraud after it\'s already happened.
The Navy will eventually use the software, but its available now in the Dangerous Waters computer game as well as a free online download.
Digital tutors, courses that get better the more students use them, and education as compelling as the best videogame may be in the country\'s future. ARPA-ED\'s Jefferson Pestronk explains how it all works.
The best defense against cyber attacks is not a new weapon system but strict human security procedures,
Do you know what furlough-bait looks like? Senior Correspondent Mike Causey says if you have a mirror handy it easy to find out.
Lawmakers included $17 million in the one-week bill to keep the government open. This is still short of the $35 million the administration requested, but it will help keep some of the open governments running.
The increased use of mobile technology is causing federal IT professionals to look at all options in managing these new devices. What should be the policy for your agency? Karim Toubba, vice president at Juniper, discusses these issues. April 5,2011
For federal IT professionals, getting your security clearance is only half the battle.
Expect a wave of spear-phishing e-mails looking for personal information and log-on credentials. This after Epsilon, an online marketing firm, was hacked. Thieves harvested millions of valid e-mail addresses.
Agencies are increasingly using social media in their work. But platforms like Facebook and Twitter offer challenges to records management.
The hack last month that compromised RSA\'s SecurID product resulted from a targeted advanced persistent threat that took advantage of a zero-day vulnerability in the Adobe Flash Player, the company confirmed.
Security experts are warning users to be on the watch for targeted email attacks after a breach at a major marketing firm that may have put millions of addresses in the hands of hackers and scammers.
The Defense Department will begin taking Social Security numbers off of the ID cards held by DoD employees and retirees. The changes, part of a 2008 SSN reduction plan, will begin in June, officials said.
Cybersecurity is often discussed in generic terms and vague descriptions. But one industry expert is calling the Department of Homeland Security\'s new cyber document clear and concise.
Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.