OVERSIGHT - ALL ARTICLES

Results 7431-7440 of 11017

State will hire contractor to supervise private embassy guards

Lawmaker and watchdog criticize plan to employ a personal services contractor to oversee employees of an embattled security company in Afghanistan.

Acquisition councils create database to track contractor misdeeds

System will be a one-stop shop for information on performance and legal violations.

Treasury chief: Federal role in housing agencies will change

Fannie and Freddie cannot continue their existing hybrid structure, says Geithner.

Defense acquisition reform panel issues final recommendations

Report calls for changes to Pentagon’s financial management and for giving acquisition workers more incentive to perform well.

Senate girds for fight on health care reconciliation

A key GOP challenge will focus on changes to the Cadillac tax on high-value plans included in reconciliation legislation.

Officials outline missile defense goals

Pentagon leaders on Monday rejected abolishing the Missile Defense Agency and transferring its functions to the different armed services.

Contractor advocates criticize administration’s ‘carry-over workforce’ plan

Groups say draft rule implementing executive order eliminates hiring flexibility for companies.

Pentagon audit cited TSA nominee's firm for overbilling

Company founded by retired Army Maj. Gen. Robert Harding overcharged the government for interrogation work in Iraq and had to pay back about $2 million.

Postal Service counts on Congress to get it out of a tight spot

Lawmakers say they’ll need more information before they can get behind a plan to reduce the number of delivery days.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.