Results 31-40 of 12663
NSA Director Adm. Michael Rogers

A 'Nation-State' Used Wikileaks to Influence the U.S. Election, the Head of the NSA Says

Rogers did not name the nation-state in question, nor elaborate on the effect it sought.

President-elect Donald Trump arrives with his family to give his acceptance speech at an election night rally Nov. 9.

Why Donald Trump (and His Family) Won’t Be Subject to Security Clearance Background Checks

A CIA chef undergoes more scrutiny for his job than does the president to receive the nation’s most closely-held secrets.

A Iraqi special forces fighter walks with his rifle during flighting with Islamic State militants in eastern Mosul on Sunday

How Special Operators Trained for Information Warfare Before the Mosul Fight

At a two-day exercise in April, U.S. troops practiced waging warfare on an invisible yet vital battlefield.

Two Navy guards assigned to the Navy Expeditionary Guard Battalion (NEGB) escort a detainee to a legal appointment in Camp Delta at Guantanamo in 2009.

Fighting Terrorism in the Age of Trump

The president-elect has vowed to kill the families of ISIS members and bring back Bush-era torture tactics.

An HH-1N “Huey” flies overhead to deliver a ceremonial sword during the annual cake cutting ceremony at Marine Corps Air Station Yuma, Ariz., Nov. 10, 2016

Unmanned Hueys Are Coming

Remote-controlled helicopters for resupply enter new phase of development.

A Transportation Security Administration officer stands in front of a portrait of slain TSA officer Gerardo Hernandez during his public memorial at the Los Angeles Sports Arena in 2013.

Shooter of Los Angeles TSA Officer Gets 60 Years

Joint Terrorism Task Force probed 2013 airport incident.

An airman assigned to the 1st Expeditionary Civil Engineering Group levels poured concrete in a trench during runway repair operations at Qayyarah West airfield, Iraq, Oct. 8, 2017.

White House: $11.6B More Needed for ISIS Fight, Afghanistan

The request brings the expected 2017 price tag for both wars to $85.3 billion.

Trump’s Long List of National Security Unknowns

Nobody knows what the president-elect will do about ISIS, NATO, or the size and shape of the U.S. military and intelligence workforce.

U.S. Army Gen. Joseph Votel, Commander of the United States Central Command, thanks U.S. and coalition forces at Qayyarah West Airfield, Iraq, Oct. 25, 2016.

Will Trump Keep Obama’s Top Mideast General?

As candidate, he vowed to demand a new anti-ISIS war plan in 30 days. Here’s the top commander who could answer the call—or be fired.

Angela Merkel said that the election “inflicted deep wounds that will not be easy to close.”

World Leaders Are Awkwardly Congratulating Donald Trump

"I want to sugarcoat anything. Nothing is easier, much will be difficult," said Angela Merkel.

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.