Technology

  • Dec. 14th, 10:00 am Cyber-threats have created unprecedented technical and social challenges that have never before been addressed. In the past, when the enemy attacked you could see it, touch it and know what damage was incurred. A cyber-bullet can attack a country, a financial institution, or a power grid and we may not be able to detect or ever know or understand the full impact of the security breach. What are the issues that the public is facing due to cyber-threats? What progress is being made in regards to cyber-security? Join us for a discussion with experts in the field of CyberSecurity to learn about this tough subject and what we need to do to stay vigilant against cyber threats and attacks.

    December 08, 2010
  • Patrice McDermott of OpentheGovernment.org, and David Stern of America Speaks, discuss lessons learned one year into the Open Government Initiative.

    December 08, 2010
  • Center for Internet Security\'s Steve Piliero discusses his group\'s study on cybersecurity metrics.

    December 08, 2010
  • The Office of Management and Budget will announce tomorrow major changes to how agencies manage their technology projects. You should expect new requirements around program management, a focus on cloud computing and several other ideas…

    December 08, 2010
  • The United States leads the world in fighter jets, warships and troops, but when it comes to cybersecurity top brass at the Defense Department say it’s a level playing field for the military and hackers…

    December 08, 2010
  • From the data management panel discussion, NOAA\'s Joseph Klimavicz discussed the agency\'s response during the Gulf Coast oil spill.

    December 08, 2010
  • Federal News Radio told you about the Army’s plans to bring smartphone technology to the battlefield within a year. If the service wants to issue every soldier some kind of smartphone, the move could turn…

    December 08, 2010
  • Even worse, they\'re getting more sophisticated too.

    December 08, 2010
  • The Defense Acquisition University has launched the first ever Department of Defense casual games site. Games Czar Alicia Sanchez explains.

    December 08, 2010
  • The Application Security Advisory Board was established to recommend ways to create awareness about the problem of insecure software and help organizations infuse security into the software development lifecycle. Boardmember Hart Rossman explains how it works.

    December 08, 2010
  • Federal agencies have been ordered to consolidate their datacenters, and both government IT managers and commercial systems integrators are focusing on select open source solutions and open software stacks to help ease this transition. IDC\'s Shawn McCarthy explains how all this works together.

    December 08, 2010
  • Computer software targeted by Stuxnet is used in US infrastructure but the virus does not appear to have affected any systems in the United States, a US cybersecurity official said Tuesday.

    December 08, 2010
  • The Department of Homeland Security gets more Freedom of Information Act requests than any other agency. It\'s now assembling a new set of processes that will centralize requests by individuals who want to know what data the agency is storing about them.

    December 08, 2010
  • Recovery.gov\'s Michael Wood joins us with a look behind the website\'s public face. December 7, 2010

    December 07, 2010

ASK THE CIO

ASK THE CIO

THURSDAYS @ 10 & 2 p.m.

Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.