Results 81-90 of 2759
Justice IG Michael Horowitz

Whistleblowers Exposed Contractors Who Sold Defective Helmets to Pentagon

Justice Department watchdog summarizes investigations of $30 million project.

Leidos Closes on Lockheed Martin’s IT Business

With Lockheed Martin’s $5 billion IT business, Leidos becomes the government’s largest IT provider.

VA Blows $300,000 On The Wrong TVs

The Detroit medical center ordered televisions that didn’t fit in its facility, so they sat in storage for nearly three years.

Saudi Losses in Yemen War Exposed by U.S. Tank Deal

The U.S. State Department says Riyadh can buy 153 Abrams tanks, 20 of which will replace ones destroyed in combat.

Fight Over Lucrative TRICARE Contracts Won’t Affect Beneficiaries, Defense Says

Three health insurance companies have filed bid protests over multi-billion dollar Defense health care contracts.

FedRAMP Ready? GSA Releases Template to Figure It Out

Cloud service providers can assess whether they're ready for FedRAMP authorization with a new template.

SBA Administrator Maria Contreras-Sweet listens to audience questions during an event with Sen. Cory Booker and Princeton University Professor Alan B. Krueger, right, at the Rutgers Business School in 2015.

Small Business Administration Defends Methods for Documenting Contracting Goals

Advocacy group seeks injunctive relief in a suit alleging the agency violates the Small Business Act.

F-35 is ‘Ready For War;’ Now the Air Force Wants More, and Faster

Buying more JSFs would lower the per-plane price tag and allow the service to retire older jets sooner.

DOD Issues Final Rule to Avoid Counterfeit Electronics

Focuses on the careful selection of suppliers and verifying the authenticity of electronic parts

GSA Officials on Increased Bid Protests: 'This is How It’s Going to Be'

Expect and plan for bid protests so agency missions aren't disrupted, officials say.

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.