March 4, 2014 Is nationalizing the world's cloud infrastructure the best way to ensure security and privacy?
February 26, 2014 A U.S. ambassador's use of Twitter during the Ukrainian revolution reveals the value of social media for diplomacy.
February 21, 2014 At a recent Nextgov event, one of the Pentagon's top counterintelligence officials offered four recommendations for preventing insider threat.
February 19, 2014 NIH has been utilizing Big Data to accelerate developments in human DNA analysis and cancer research.
February 11, 2014 The VA must rely on big data tools to prevent the next generation of backlogged claims.
February 6, 2014 A 2010 independent review panel appointed by Congress offers benchmarks for evaluating the 2014 QDR.
April 9, 2013Underwritten by SAP NS2 As part of 2012’s Big Data Research and Development Initiative, six major agencies committed funding “to greatly improve the tools and techniques needed to access, organize and glean discoveries from huge volumes of data.” The Department of Defense (DoD) is one of the biggest investors, funding $250 million worth of big data projects each year. While most of the funding currently goes toward the development of autonomous systems and improving the situational awareness, the data processing power behind these capabilities could also be leveraged to improve program performance.
March 18, 2013Underwritten by Symantec Though continuous monitoring has been “required” of agencies for several years, many lacked the inventory knowledge of their own systems to be able to implement continuous monitoring effectively. To close the gaps, the Department of Homeland Security (DHS) is taking steps to offer continuous monitoring as a service (CMaaS) to all civilian agencies, thereby giving agencies the support services they need to comply with previous mandates.
March 11, 2013Underwritten by F5 As government works to keep up with the mobile revolution, more applications are becoming available on personal devices. While these programs may simplify transactions and potentially decrease costs, they can also make the agency vulnerable to security breaches. One of the biggest threats is social engineering, a process by which a user is tricked into offering up information or access rights.
December 21, 2012Underwritten by NetApp Countless studies have contributed valuable work to the study of presidential transitions, but a large gap exists in the study of incumbent reelections. The Government Business Council (GBC) has combined secondary and primary research gleaned from a survey, expert interviews, and written testimonials to provide federal managers with a thorough guide to surviving a second term transition.