Technology

  • August 12th, 2010 at 11 AM How does one assure trust in Cyberspace? As citizens, government, and business enterprise increase the amount of information that is shared online, fundamental questions arise around security requirements, data and identity management, and infrastructure. Trusted online environments can reduce costs, expand services, and are critical to protecting how, and to whom, information is shared. Securing identities in transactions is an essential component to building trusted online systems and a critical priority for both business and government. As online information sharing and collaborative services evolve between people and technologies, will trust emerge as the next \"Killer App\"?

    August 02, 2010
  • August 11th at 11:05am The DoD GIG IA Portfolio Management Office (GIAP) has learned through experience that mission critical networks are contested, violated, infiltrated and penetrated, leading to significant risks to US interests. The U.S. critical infrastructure has evolved from a ‘network enabled\' position to one that is now ‘network dependent.\' No aspect of the national critical infrastructure operates without extensive use of information technology, and it is this very fact that makes our networks such a high priority target for adversaries. The need for secure, self-aware, proactively managed defense mechanisms has never been more critical. Commercially available technologies, when combined with research and development done by both the government and the private sector, represent the best possible approach for combating the types of threats our critical infrastructure is facing today.

    August 02, 2010
  • Microsoft Quashed Effort to Boost Online Privacy, Hacker builds $1,500 cell-phone tapping device

    August 02, 2010
  • With so much at stake, what role, if any does the federal government play in protecting the .com Internet domain? Several experts offer some candid observations on what the government\'s role should be.

    August 02, 2010
  • Teleworkers work more efficiently. Now there\'s a way to spend that paycheck more efficiently too.

    July 30, 2010
  • A new report shows stunning results.

    July 30, 2010
  • Today’s Federal News Countdown panel includes two OMB vets: —Dan Chenok, Senior Fellow, IBM Center for the Business of Government —Tim Young, Senior Manager, Deloitte Consulting LLP And their choices for the three most important…

    July 30, 2010
  • Learn more in today\'s cybersecurity update.

    July 30, 2010
  • Retired CIA chief Michael Hayden on Thursday added his voice to the debate.

    July 30, 2010
  • A new, free installable web application lets collects and organizes replies to your conversations on Twitter, Facebook and other networks.

    July 30, 2010
  • The old system simply did not account for the number of IP addresses that phones would use.

    July 30, 2010
  • How Web 2.0 tools can help the government.

    July 30, 2010
  • Outgoing OMB Director lists accomplishments of administration in speech at his former home, the Brookings Institution.

    July 30, 2010
  • Our Federal News Radio Discussion this month explores cybersecurity and the insider-threat with Jerry Davis of NASA, NIST\'s Elaine Newton, and Bobbie Stempfley from DHS.

    July 30, 2010

ASK THE CIO

ASK THE CIO

THURSDAYS @ 10 & 2 p.m.

Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.