AUTHOR ARCHIVES

Results 51-60 of 861

What're Cyber Workers' Salaries?

August 25, 2010 FROM NEXTGOV arrow The SANS Institute, a cybersecurity research and training company in Bethesda, Md., is conducting a survey of how much information security workers in the federal government and in the contracting community make. So, they want to hear from you, Mr. and Ms. Cyber Employee. There's really no good account of...

Defense Networks Breached in 2008

August 25, 2010 FROM NEXTGOV arrow The Washington Post reported on Wednesday that Deputy Defense Secretary William J. Lynn III says in an article to be released today that malicious code on a flash drive inserted in a military computer in 2008 in the Middle East "spread undetected on both classified and unclassified systems." It established...

Find Your Agency

August 24, 2010 FROM NEXTGOV arrow What are the most popular Web icons on the Web? This is a visualization of the top 2 million "favicons," sized by relative popularity of the sites, by Nmap. Go here to use the online viewer to drill down into the grpahic. Try to find your federal agency or even...

'Hi, I'm a Dirty Hospital Bed'

August 24, 2010 FROM NEXTGOV arrow The following item was posted by Nextgov Editor at Large Bob Brewin. We've all heard of electronic whiteboards used to add a little punch to usually boring presentations, but how about "electronic bed boards" to track the status of hospital beds? I stumbled into the world of electronic hospital bed...

Consider Cloud Computing Consequences

August 24, 2010 FROM NEXTGOV arrow As agencies move to cloud computing - accessing basic computing services and applications over the Internet - some unforeseen consequences will occur. The Office of Management and Budget and the CIO Council want to head them off before they become serious. Case in point: Private information could be compromised when...

Debate Over State's Cyber Strategy

August 23, 2010 FROM NEXTGOV arrow Michael Ono posted a column on Sunday at The Huffington Post citing an April inspector general report criticizing the State Department's alternative cybersecurity practice of continuous monitoring. The process is an alternative to the long reporting cycles required in the 2002 Federal Information Security Management Act. The (relatively) new cyber...

High Risk List Posted

August 23, 2010 FROM NEXTGOV arrow The Office of Management and Budget just released its high-risk list of information technology projects. A full story will be posted later today. Here's a quick count by department: Agriculture -- 1 Commerce -- 2 Defense -- 4 HHS -- 1 DHS -- 3 HUD -- 1 Interior -- 2...

White House Throwback Home Page

August 20, 2010 FROM NEXTGOV arrow My colleague Tom Shoop, editor in chief at Government Executive, posted in the FedBlog on Friday an image of the home page for the White House website circa 1994: Notice the "comments" button on the right. Sounds kinda like open government's public participation, but maybe version 1.0. They just didn't...

You Can Teach Old Dogs New Tricks

August 20, 2010 FROM NEXTGOV arrow OK, that's not meant as a dig. But it's a good description of what can only be described as a quick turnaround for Sen. John McCain, R-Ariz., who almost boastingly stated during his 2008 presidential campaign, "I don't e-mail," and then watched his opponent Barack Obama digitally fly past him...

Tweeting Docs

August 19, 2010 FROM NEXTGOV arrow More physicians are starting to log on to Twitter to connect with patients, promote their practices and discuss issues like health care reform. Dr. Howard Luks, an orthopedic surgeon who's chief of sports medicine and arthroscopy at University Orthopedics and Westchester Medical Center north of New York City, is one....