OVERSIGHT - ALL ARTICLES

Results 8081-8090 of 11184

GAO faults effort to counter roadside bombs

Report says "several significant challenges" affect the Pentagon's ability to oversee IED office.

House advances on Interior spending bill, including CR

Current government funding extension runs through the end of this week.

Officials commit to collaborate on performance-based budgeting

Lawmakers, administration say they will weigh the success and failure of federal programs when making funding decisions.

Negotiators agree on plan to fund agencies through mid-December

Stopgap spending measure will be attached to the Interior-Environment appropriations bill and will keep money flowing at fiscal 2009 levels until Dec. 18.

Probe of intelligence notification lapses includes Pelosi's briefings

Investigators will examine whether the CIA misled the House speaker about the use of waterboarding on terrorism suspects.

Senators clash over Homeland Security management nominee

Maine Republican Sen. Susan Collins says Obama's pick for undersecretary for management at DHS lacks sufficient experience.

Agencies to expedite electricity transmission permits on federal land

New process aims to speed up grid modernization and spur renewable energy production.

Senators express concern about administration’s contracting guidance

Memos are too light on specifics and lack deadlines to hold agencies accountable for making reforms, lawmakers say.

From Nextgov.com: VA will turn to a contractor to reduce backlog of GI educational benefits

Solicitation is the department's latest effort to process what officials call an unprecedented volume of claims.

SBA proposes major revisions to small business contracting program

Changes would affect joint ventures, size and income determinations for potential participants.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.