Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Gordon Gillerman and Matt Scholl of NIST discuss standards, certification and accreditation with host John Gilroy. June 19, 2012(Encore presentation December 25, 2012)
The X-37B's flight included a classified payload. Air Force Lt. Col. Tom McIntyre, the plane's program manager, said the aircraft provided the military with testing capabilities without the risks other programs face.
Kaspersky Labs spotted malware disguised as a fake security app called "Android Security Suite Premium," Computerworld reports. The malware is a threat to everyday smartphone users as well as businesses that allow employees to use personal devices on the network.
A law Congress passed in April to ban congressional members and federal workers from profiting on non-public information places unnecessary reporting burdens on senior executives and make them vulnerable to identity theft.
Avinash Kar of the Natural Resources Defense Council discusses an FDA decision on cattle feeding processes. Attorney Joseph Petrillo offers his perspective on burgeoning bid protests. GAO's Bill Woods talks about GSA's reliance on "dun" numbers. Jamison Cush discusses Microsoft's new tablet device. Charles Scoville works with amputee veterans.
After breaking into the network, the man allegedly tried to sell access to DoE for $50,000.
The Cybersecurity Technologies Research Lab's goals include building the scientific foundation for cybersecurity research, developing critical relationships and testing solutions in real-world situations.
Lockheed Martin, the federal government's largest contractor landed up to $1.9 billion worth of work Friday in a deal to operate Defense Department networks across the globe.
Jacob Taylor, a physicist at the National Institute of Standards and Technology, is a finalist for a 2012 Service to America Medal.
Federal agencies running virtualized computer systems might be vulnerable to a new cyber attack. The warning comes from the U.S. Computer Emergency Readiness Team.
Last week it accidentally posted the home addresses of its newest top-level domain-name applicants, Government Computer News reports.
With the plan, defense leaders hope to harness the best that wireless technology can offer. The strategy includes goals for secure information sharing via voice, video and data feeds. It also promotes app development.
The IBM Center for the Business of Government released a report examining the lessons from the execution of the stimulus over the last three years.
Big data enthusiasts from government, industry and academia are getting their hands dirty. The National Institute of Standards and Technology and the National Science Foundation held a two-day workshop recently to explore the technologies needed to collect and analyze big data. Attendees also examined how big data can enhance areas like science, health and security. The government announced in March its plans to invest $200 million dollars in the growing field.
Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.