ep trends

Technology for Border and Perimeter Security

Technology for Border and Perimeter Security

Related Articles

GDIT Recruitment 600×300
Tom Temin 250×250
GM 250×250
GovExec Newsletter 250×250
Cyber Education, Research, and Training Symposium 250×250
December Breakfast 250×250

Upcoming Events

USNI News: 250×250
Nextgov Newsletter 250×250
WEST Conference
GDIT Recruitment 250×250
NPR Morning Edition 250×250
Winter Gala 250×250
AFCEA Bethesda’s Health IT Day 2018 250×250
Pentagon Considering Push to Software-Defined Networking

Pentagon Considering Push to Software-Defined Networking

Pentagon

Related Articles

GDIT Recruitment 600×300
Tom Temin 250×250
GM 250×250
GovExec Newsletter 250×250
Cyber Education, Research, and Training Symposium 250×250
December Breakfast 250×250

Upcoming Events

USNI News: 250×250
Nextgov Newsletter 250×250
WEST Conference
GDIT Recruitment 250×250
NPR Morning Edition 250×250
Winter Gala 250×250
AFCEA Bethesda’s Health IT Day 2018 250×250
In Quest to Replace Common Access Card, DoD Starts Testing Behavior-Based Authentication

In Quest to Replace Common Access Card, DoD Starts Testing Behavior-Based Authentication

Related Articles

GDIT Recruitment 600×300
Tom Temin 250×250
GM 250×250
GovExec Newsletter 250×250
Cyber Education, Research, and Training Symposium 250×250
December Breakfast 250×250

Upcoming Events

USNI News: 250×250
Nextgov Newsletter 250×250
WEST Conference
GDIT Recruitment 250×250
NPR Morning Edition 250×250
Winter Gala 250×250
AFCEA Bethesda’s Health IT Day 2018 250×250
How Many Times Has Your Personal Information Been Exposed to Hackers?

How Many Times Has Your Personal Information Been Exposed to Hackers?

At least 500 million Yahoo users had their information stolen in 2014, the company said on Thursday — a year when half of American adults had their personal information exposed to hackers. Several more big names have been attacked since.

Related Articles

GDIT Recruitment 600×300
Tom Temin 250×250
GM 250×250
GovExec Newsletter 250×250
Cyber Education, Research, and Training Symposium 250×250
December Breakfast 250×250

Upcoming Events

USNI News: 250×250
Nextgov Newsletter 250×250
WEST Conference
GDIT Recruitment 250×250
NPR Morning Edition 250×250
Winter Gala 250×250
AFCEA Bethesda’s Health IT Day 2018 250×250
Comey: Pushing ISIS Off Twitter Forces Them Where We Can’t Follow

Comey: Pushing ISIS Off Twitter Forces Them Where We Can’t Follow

Fifteen years after the 9/11 terrorist attacks, counterterrorism efforts expand beyond the physical world to social media and encrypted communications, where federal workers actively try to prevent terrorists from radicalizing potential attackers online.

That’s how three top senior counterterrorism officials described their sprawling challenge to a Senate committee Tuesday, where they faced questions about how they could better use technology to prevent future attacks. The hearing was held shortly after the anniversary of 9/11, and also within months and days of the Pulse nightclub shooting in Orlando as well as a series of pipe- and pressure-cooker bombs detonating in the New York City area.

Related Articles

GDIT Recruitment 600×300
Tom Temin 250×250
GM 250×250
GovExec Newsletter 250×250
Cyber Education, Research, and Training Symposium 250×250
December Breakfast 250×250

Upcoming Events

USNI News: 250×250
Nextgov Newsletter 250×250
WEST Conference
GDIT Recruitment 250×250
NPR Morning Edition 250×250
Winter Gala 250×250
AFCEA Bethesda’s Health IT Day 2018 250×250
Laying the Foundation for a More Secure, Modern Government

Laying the Foundation for a More Secure, Modern Government

America’s spirit of ingenuity and entrepreneurship created the world’s most innovative economy and keeps us dominant in today’s digital age. Indeed, in 1985 about 2,000 people used the Internet; today, 3.2 billion people do. What started out as a useful tool for a few is now a necessity for all of us—as essential for connecting people, goods, and services as the airplane or automobile.

Without doubt, modern technology has created great opportunities for innovation and advancement.  But, in a world that is increasingly connected by technology, with greater opportunity comes greater risk. That’s true for major companies, and it’s certainly true for the Federal government. Many Federal departments and agencies rely on aging computer systems and networks running on outdated hardware and infrastructure that are expensive to operate and difficult to defend against modern cyber threats. Of the $82 billion in Federal IT spending planned for 2017, approximately 78 percent ($63 billion) is dedicated to maintaining legacy IT investments. As more and more data is stored online, the need to protect against the adverse consequences of malicious cyber activity becomes more pressing each year.

Related Articles

GDIT Recruitment 600×300
Tom Temin 250×250
GM 250×250
GovExec Newsletter 250×250
Cyber Education, Research, and Training Symposium 250×250
December Breakfast 250×250

Upcoming Events

USNI News: 250×250
Nextgov Newsletter 250×250
WEST Conference
GDIT Recruitment 250×250
NPR Morning Edition 250×250
Winter Gala 250×250
AFCEA Bethesda’s Health IT Day 2018 250×250