Search Results for "" homeland security committee ""
Not finding what you’re looking for?
10 of 6350 Results
Demonstration Tackles New Challenges
The U.S. Department of Homeland Security went on a shakedown cruise in the military world with its inaugural participation in the Joint Warrior Interoperability Demonstration this summer. Department personnel discovered how useful the event can be to explore new technologies, while military personnel gained greater insight into homeland security needs and how to support U.S. emergency operations. Many lessons were learned by military and homeland security participants alike in areas that reached beyond technology.
Watch Out, Mobile Agents
A fast-moving squad of government and industry computer security experts is preparing to swing into action. This computer-security-expert assist team is structured to support federal government agencies by providing ways to protect information technology systems and networks. The team's core will be industry members who are proficient in identifying and alleviating complex information system and infrastructure vulnerabilities.
Opportunities Abound in 2009
I want to take advantage of this new year’s Source Book edition to share with you some of the exciting things that are going on in AFCEA. 2008 was a good year—a year of firsts for AFCEA and its membership. We completed our first strategic plan, which created a five-year vision for the association. We created a Strategic Planning Committee to follow through on that plan. We increased focus and emphasis on some important and growing components of the membership: small business, young AFCEANs and international members. To support these diverse groups as well as those who are remote from AFCEA Headquarters and the Washington, D.C., area, we expanded online services and introduced new means of collaboration and service delivery. We started the Solutions series of events—a new concept for AFCEA that combines physical presence and online participation in a more interactive and ongoing dialogue. We formed a Homeland Security Committee to focus year-round on this critical component of our community.
Defense Department's Achilles' Heel Targeted for Heightened Protection
The U.S. Department of Defense is not fully exploiting information technology in military operations and departmental procedures. For an organization that relies on information superiority and technological capabilities to put U.S. national defense at an advantage, the department is lax in thwarting potentially devastating threats to its information systems.
Trusted Gate Closes on Thin-Client Computer Network Security Holes
Researchers at Sandia National Laboratories are developing an architecture to eliminate threats to thin-client computer networks. These networks rely on applications servers to drive desktop workstations. Coupling security elements that will evolve from their work with commercial technology, the scientists hope to create a computing environment that offers increased flexibility and accessibility for network users without compromising security.
Agencies Review Effect Of Government Oversight
A new report grades the graders as computer security officers share how federal guidance and reporting are affecting their organizations. Many believe the regulations have improved their organizations' safety measures, but there is a disparity of opinion about effectiveness, and some contend that funding should be tied to the process.
Congress Raises Privacy and Civil Liberty Concerns with the DHS’ Use of Biometrics
The federal government's use of facial recognition and other technologies must be scrutinized, some lawmakers assert.
Image

Disruptive by Design: How to Evolve Federal Cloud Security
While Cloud First enables agencies to maximize capacity utilization, minimize cost and improve information technology flexibility and responsiveness, the government still faces challenges, particularly with cybersecurity—as highlighted by the breach of Office of Personnel Management servers that exposed the biometric identifiers of more than 5.6 million U.S. federal employees.
Integration, Relationships And Virtual Work Make A Difference
Modeling and simulation are becoming more critical in military and homeland security efforts, and academia is playing a key role in the ongoing development process. Old Dominion University has dedicated an entire center to the field with emphasis in several areas essential to government, including a division specifically focused on national defense and protection. The center’s personnel work with counterparts in other organizations to develop capabilities for efforts as diverse as planning hurricane evacuation routes and improving care for wounded warriors, and they offer analysis for particularly complex problems as well. In addition to their project-focused endeavors, the researchers are creating standards in modeling and simulation to ensure better interoperation in the future.
When Security Leads, Compliance Follows
Public and private organizations should pay close attention to cybersecurity regulations in the legislative pipeline and adhere both to the rules and intent.