Results 31-40 of 6100

Expect a Cyber Budget Boost But Stay Tuned for that Executive Order, Homeland Adviser Says

Don’t expect a multibillion-dollar investment that will modernize government cybersecurity in one fell swoop, though.

CIO Council to Agencies: Share Your Developer Platforms

18F's could be a step in the right direction.

White House’s Annual Cyber Report Counts 30,000 Incidents but Only 16 are 'Major'

Ten of the major incidents occurred at the Federal Deposit Insurance Corporation.

State Department CIO: ‘If People Aren’t Laughing At You, Your Goals Aren’t Big Enough'

Frontis Wiggins' plan includes revolutionizing how the agency does innovation.

Trump Cyber Czar Brings Deep Expertise but Maybe Some Baggage, Too

Rob Joyce led hacking operations at NSA, which may turn off some businesses wary of post-Snowden links to the intel community.

Watchdog: DHS Isn't Ready for Social Media to Become a Bigger Part of Visa Screening

The department's social media pilot programs lack adequate benchmarks, so DHS doesn't have a good way to evaluate whether they're working.

Comment Period Extended for FedRAMP's New Baseline

The "Tailored" baseline was introduced as a possible means to usher in speedier assessments for certain kinds of solutions.

The exterior of the Internal Revenue Service building in Washington.

IRS Took Down FAFSA-Autofill Tool to Prevent Identity Theft

IRS suspended the tool as part of a broader effort to protect taxpayer information.

WikiLeaks Dump Shines Light on Government's Shadowy Zero-Day Policy

The documents shed little light on how many unknown vulnerabilities the intelligence agency retains and how well it vets the damage they might cause.

Meet the Agency that Tops All Organizations in Customer Satisfaction

“It’s a combination of our structure, training, our people and our connectedness to the mission that keeps it going."

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.