AUTHOR ARCHIVES

Alexandra Jaffe

Results 11-20 of 34

Congressional homeland security leaders pessimistic on Afghanistan

May 14, 2012 In the wake of news that an Afghan peacemaker was killed in Kabul on Sunday, top lawmakers on Congressional homeland security panels struck a pessimistic tone about the U.S. mission in Afghanistan, warning that the Taliban is clearly not interested in negotiation. “They're not interested in genuine peace talks,” said...

CIA reportedly foils al Qaeda underwear bomb plot

May 7, 2012 The CIA foiled an al Qaeda-backed bomb plot out of Yemen, the Associated Press reported on Monday, that aimed to take down an airplane headed for the U.S. The attack was planned around last week's anniversary of Osama bin Laden's death, and the suicide bomber planned to use an upgraded...

Congressional intelligence leaders say Taliban is stronger

May 7, 2012 Despite a years-long war and concerted efforts to bring down the Taliban, congressional intelligence leaders agree that the organization is stronger now. “President Karzai believes that the Taliban will not come back. I am not so sure,” said Sen. Dianne Feinstein, D-Calif., chair of the Senate Intelligence Committee, on CNN’s...

Senator wants 'open and transparent' White House review of Colombia incident

May 3, 2012 Sen. Chuck Grassley, R-Iowa, ranking member of the Senate Judiciary Committee, is satisfied with the Secret Service response to his inquiries about alleged misconduct of Secret Service agents in Colombia, but wants a better response from the White House. In an April 20 letter to Secret Service Director Mark Sullivan...

Postmaster general says Congress must act

April 30, 2012 Postmaster General Patrick Donahoe warned on Sunday that Postal Service finances are so dire that Congress should act in the next few weeks. “We would love to be in a situation where we had meaningful legislation by the end of May,” he said on C-SPAN’s Newsmakers. "I know that is...

'We're on the path to al Qaeda's destruction,' terrorism adviser says

April 30, 2012 President Obama’s chief counter-terrorism adviser, John Brennan, took to the airwaves on Sunday to ensure the American people that they are safe from terrorist attacks. “We’re on the path to al Qaeda’s destruction,” he said on CNN’s State of the Union. “It’s a murderous organization that has killed many. …We...

Clinton, Obama discuss bin Laden killing

April 30, 2012 Is Hillary Clinton watching the killing of Osama bin Laden or a Hollywood blockbuster? Just looking at her face, you might not know. "That's the way I usually look when my husband drags me to an action movie," she said during an interview with NBC's Brian Williams to be aired...

Public opinion of federal government at 15-year low

April 27, 2012 Public opinion of the federal government is at a 15-year low, with only a third of Americans viewing it favorably, according to a new Pew survey. Sixty-two percent view it unfavorably. Of possible concern for President Obama is a 9-percentage-point drop in the public's opinion of the federal government since...

Lawmakers weigh in on GSA, Secret Service scandals

April 23, 2012 The Secret Service and General Services Administration scandals are two very disparate situations -- one revolves around sex, the other around lavish spending. But it’s no coincidence that both took center stage on Sunday's political talk shows, as both indicate a government lacking oversight, characterized by a culture of autonomy...

Gingrich Secret Service detail still costing taxpayers

April 19, 2012 Though Newt Gingrich has admitted that Mitt Romney is the likely Republican nominee, the former House speaker is still costing taxpayers thousands for his Secret Security detail, which his campaign will not give up, the Daily Caller reports. In 2008, Secret Service Director Mark Sullivan testified at a House Appropriations...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.