Results 101-110 of 6019
Power speaks in Seoul in October.

Russian Hackers Will Try ‘Again and Again,’ Warns Samantha Power

In her parting speech, Obama’s UN ambassador says it is ‘naive’ to think Russia won’t keep meddling to destabilize the West.

Education Dept. Builds Show and Tell Space for Developers

There's a new GitHub repository for anything built with Education Department data.

The Federal Trade Commission building in Washington.

FTC’s Plea To Academia: Keep Protecting Consumers

The outgoing chief technologist asked researchers to study ads, labels and other consumer issues.

White House Cybersecurity Coordinator Michael Daniel at a news conference in Washington in 2013.

We Have 'Very Robust Defenses': An Exit Interview with Cyber Coordinator Michael Daniel

Daniel defended the administration's cyber legacy in an exit interview, pointing to a bevy of new policies and cyber détente with China.

President Barack Obama speaks during his farewell address at McCormick Place in Chicago, Tuesday, Jan. 10, 2017.

Obama’s Cyber Legacy: He Did (Almost) Everything Right and It Still Turned Out Wrong

Obama took cyber seriously and tried to tame it, but we’re no safer in cyberspace today than we were eight years ago, experts tell Nextgov.

Homeland Security Secretary Jeh Johnson

Agencies Miss—But Come Close To—Cyber Deadlines

DHS hits 93 percent deployment on its cyber protection tool Einstein 3A.

Commerce Wants Your Thoughts on Preliminary Internet of Things Guidance

As connected devices proliferate, the internet of things could eventually "increas[e] efficiency and convenience for industry, consumers and government to improv[e] safety,” Commerce Secretary Penny Pritzker said in a statement.

Californians vote in 2014.

Why Elections Are Now Classified as 'Critical Infrastructure'

President Obama’s homeland security adviser hinted that it might help deter foreign cyberattacks.

GAO Denies Alliant 2 Protests, Evaluations to Come

The protests questioned GSA's self-scoring system and baseline price.

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.