Over the next three years, the military will deploy a series of sophisticated gateways to better protect its vast network from external attack, according to Army Col. Scott Jackson, who oversees construction of the Joint Informational Environment or JIE.
According to U.S. Customs and Border Protection (CBP), it takes about 20 seconds to identify and verify each person’s identity using government databases to determine whether or not the individual is on a watch list or unwelcome on U.S. soil for any reason. That’s not fast enough.
The Federal government’s security clearance system is outdated and needs to be replaced, but fixing it is going to take time because the government is still years away from fully developing a continuous evaluation process that can replace today’s once-every-five-years investigations.
What happens when you bring together some of the nation’s leading hackers, the Pentagon’s chief of training and an Air Force Academy professor who teaches cyber skills to cadets? They all agree on one thing: The government’s approach to cyber security is coming up short.
The intelligence community and private industry are pooling their efforts to fight rising threats to national cybersecurity.
On this edition of \"Disaster Relief for America\", hosts Tim Karney and Tom Moran interview Colonel Richard Neely of the United States Air Force.
On this special edition of \"Disaster Relief for America\", host Tim Karney interviews host Tom Moran about the All Hazards Consortium.
Kerry Weems, the vice president and general manager for Health Solutions for General Dynamics Information Technology will discuss data collection and IT security. May 28, 2013
CIOs are getting new responsibilities and powers, and will need new skills to execute them.