Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
On this week's Bloomberg Government Capital Impact show, analysts will discuss which cybersecurity companies are being targeted for mergers and acquisitions. Plus, what's next in the internet tax debate and how are companies benefiting from the R&D tax credit. August 2, 2012
Kris Collo, President and CEO of MicroPact, joined Industry Chatter to discuss mobile device use in the federal workplace and whether the bring-your-own-device policy is a good solution for the government. The government struggles to…
The Social Security numbers and bank routing numbers of about 8,000 accounts were exposed in a cyber breach of an Environmental Protection Agency database.
Susan Swart left the State Department for the International Monetary Fund CIO. She reflects on her successes and the change in federal technology.
A battle over the role companies should play in keeping the U.S. safe from cyber attacks threatens to kill cybersecurity legislation in the Senate
The developing field of using social media to gather information can provide benefits to the intelligence community, but it also involves challenges. The changing environment of open source intelligence requires agencies and companies plan their approaches carefully.
The contract includes "very stringent" IT security requirements. The announcement follows a data breach that affected 123,000 TSP participants in 2011.
The long-awaited, problematic case management application met full operational capability in May. Jeff Johnson, the FBI's CTO, said about 30,000 employees have been using Sentinel for about a month. The $451 million program modernizes the FBI's workflow and document management system.
Mario Hyland from AEGIS.net will talk about exchanging information between medical systems. July 31, 2012(Encore presentation August 28, 2012)
New mobile application helps military personnel and veterans undergoing post-traumatic stress disorder treatment to relieve stress and work through traumatic memories.
The White House is updating its 2010 trade secret theft and counterfeit product prevention strategy. The new plan will incorporate public input, which the administration is currently soliciting from stakeholders.
The General Services Administration will hold a vendor day Aug. 7 in Washington, D.C. The concept of identity management in the cloud builds on the efforts included in the National Strategy for Trusted Identities in Cyberspace (NSTIC).
NSA director Gen. Keith Alexander gave the keynote at this year's Defcon in Las Vegas.
Two years after U.S. Cyber Command became operational, the military services that provide its cyber forces are beginning to more tightly define their respective responsibilities in the joint cyber environment. Gen. Keith Alexander issued a memo recently giving each of the services a lead cyber role for specific geographic areas of the world.
Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.