Advertisement

You will be redirected to the page you want to view in  seconds.

 CIOs

  1. Man Looking At Computer Screen (Thinkstock) Chad Kawalec / Getty Images/Hemera

    'Operation DeathClick' targets defense contractors

    Cybersecurity analysts suggest attacks on federal systems not far behind.

    • Oct. 17, 2014
  2. A security firm's logo for the Sandworm vulnerability. The name and image derive from Frank Herbert's science-fiction novel Dune. iSIGHT Partners

    Microsoft-based systems at risk from 'Sandworm' vulnerability

    Security gap in Microsoft products has been used to breach an American university, systems in Europe.

    • Oct. 16, 2014
  3. Cray's Sonexion data storage system is included in a new DoD contract. Cray

    Cray takes DoD supercomputer contract

    The agreement comes through DoD's High Performance Computing Modernization Program.

    • Oct. 9, 2014
  4. Dr. Joseph JaJa (left) and Dr. Anupam Joshi (right). (USM) University System of Maryland

    Players picked for first federally-funded R&D center for cybersecurity

    MITRE Corp. and University System of Maryland will join NIST to help private industry solve cybersecurity problems.

    • Oct. 7, 2014
  5. Challenge.gov launched to simplify competitive innovation

    A revamped Challenge.gov is giving federal agencies a central location to advertise and track competitive challenges used to spur innovation from the private the sector.

    • Oct. 3, 2014
  6. The Bureau of Labor Statistics projects a deficit of 1 million IT professionals and computer programmers by 2020. EPA

    Job training grants heavily favor IT, cybersecurity sector

    New wave of grant awards highlights need for more computer science grads.

    • Oct. 2, 2014
  7. Some agencies are embracing virtual desktop infrastructure, which allows employees remote access to agency data on personal devices but no storage capabilities. Mike Morones/Staff

    Emerging tech offers advanced security for BYOD programs

    Virtualization may be key to agency-approved use of personal devices.

    • Oct. 2, 2014
  8. Rep. Mike Rogers warns that 85 percent of critical networks are vulnerable. Chip Somodevilla/Getty Images

    U.S. not ready to launch offensive cyber attacks, says congressman

    As a House committee drafts a policy for cyber action, it remains uncertain that it will become effective anytime this year.

    • Oct. 1, 2014
  9. iRobot's 510 PackBot, a bomb disposal and surveillance tool, can climb stairs and lift up to 15 pounds. iRobot

    Small unmanned systems find growing security role

    UAVs are just one piece of the universe of unmanned systems.

    • Sep. 29, 2014
  10. Justice's LawJobs app. Department of Justice

    Justice launches new 'Law Jobs' app

    The app 'aligns with President Obama's digital government strategy'

    • Sep. 22, 2014
  11. Federal CIO Steven VanRoekel has a history of using data and technology to tackle emerging health issues, including an early role in the Gates Foundation and a previous stint at USAID in 2011.

    Federal CIO VanRoekel moves to USAID

    VanRoekel will serve as a senior advisor focused on the Ebola outbreak

    • Sep. 19, 2014
Industry Circle

Your free source for the latest insights, trends, technology and forward thinking from industry leaders.

Visit industrycircle.com today!