OVERSIGHT - ALL ARTICLES

Results 7151-7160 of 11016
Adm. Thad Allen is leading the federal response to catastrophe.

Coast Guard evaluates hurricane impact on Gulf oil spill

Responders shift effort from killing the well to containing it, risking a temporary increase in the flow of oil.

From Nextgov.com: Amazon talks cybersecurity in the cloud for feds

Nextgov discusses government managers’ fear of losing control, data breaches and disaster recovery with Adam Selipsky, head of the company’s Web services division.

None

ICE steps up immigration enforcement efforts

John Morton and his agency have a lot to prove if comprehensive immigration reform is to become a reality.

High-performing organizations fade into the A-76 sunset

Moratorium on public-private job competitions has taken away one incentive for the voluntary business reform process, report finds.

Bureau of Land Management chief moves to MMS

Abbey will be put in charge of managing the announced division of MMS into three bureaus.

House passes Defense policy bill

Chamber defeats civilian pay freeze amendment before passage.

New counterterror strategy to spell out Obama vision

Administration's plan seeks an international order that promotes peace, security and opportunity.

Stage is being set for congressional border security battle

Provisions adding funding for border efforts could prove contentious during conference negotiations on the wartime supplemental spending bill.

Burning Question: On federal spending, is it time to hit the gas or the brakes?

Lawmakers and Obama administration officials apparently are of two minds on the issue.

Minerals Management Service chief steps down

Resignation comes as the agency is under criticism for oversight failures that contributed to the Gulf oil spill.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.