Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Dec. 14th, 10:00 am Cyber-threats have created unprecedented technical and social challenges that have never before been addressed. In the past, when the enemy attacked you could see it, touch it and know what damage was incurred. A cyber-bullet can attack a country, a financial institution, or a power grid and we may not be able to detect or ever know or understand the full impact of the security breach. What are the issues that the public is facing due to cyber-threats? What progress is being made in regards to cyber-security? Join us for a discussion with experts in the field of CyberSecurity to learn about this tough subject and what we need to do to stay vigilant against cyber threats and attacks.
Patrice McDermott of OpentheGovernment.org, and David Stern of America Speaks, discuss lessons learned one year into the Open Government Initiative.
Center for Internet Security\'s Steve Piliero discusses his group\'s study on cybersecurity metrics.
The Office of Management and Budget will announce tomorrow major changes to how agencies manage their technology projects. You should expect new requirements around program management, a focus on cloud computing and several other ideas…
The United States leads the world in fighter jets, warships and troops, but when it comes to cybersecurity top brass at the Defense Department say it’s a level playing field for the military and hackers…
From the data management panel discussion, NOAA\'s Joseph Klimavicz discussed the agency\'s response during the Gulf Coast oil spill.
Federal News Radio told you about the Army’s plans to bring smartphone technology to the battlefield within a year. If the service wants to issue every soldier some kind of smartphone, the move could turn…
Even worse, they\'re getting more sophisticated too.
The Defense Acquisition University has launched the first ever Department of Defense casual games site. Games Czar Alicia Sanchez explains.
The Application Security Advisory Board was established to recommend ways to create awareness about the problem of insecure software and help organizations infuse security into the software development lifecycle. Boardmember Hart Rossman explains how it works.
Federal agencies have been ordered to consolidate their datacenters, and both government IT managers and commercial systems integrators are focusing on select open source solutions and open software stacks to help ease this transition. IDC\'s Shawn McCarthy explains how all this works together.
Computer software targeted by Stuxnet is used in US infrastructure but the virus does not appear to have affected any systems in the United States, a US cybersecurity official said Tuesday.
The Department of Homeland Security gets more Freedom of Information Act requests than any other agency. It\'s now assembling a new set of processes that will centralize requests by individuals who want to know what data the agency is storing about them.
Recovery.gov\'s Michael Wood joins us with a look behind the website\'s public face. December 7, 2010
Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.