Results 831-840 of 861

Plea Continues For Cross-Agency Spending

April 12, 2007 FROM NEXTGOV arrow The following post was written by Tim Clark, editor and president of Government Executive. It was a long day of technology talk at the Press Club yesterday. The security event (see below) began at 7:30 a.m., and another event, sponsored by the Association for Federal Information Resources Management ended at...

An Explanation of OMB's Security Mandate

April 12, 2007 FROM NEXTGOV arrow The following post was written by Tim Clark, editor and president of Government Executive. A bit of skepticism has been flying around about the government’s effort to achieve significant advances in cybersecurity by standardizing agencies’ use of the Microsoft Windows operating system. Or so our own reporting would suggest. But...

NASA Asks Users' Input for Web Re-Design

April 12, 2007 FROM NEXTGOV arrow This post was written by Karen Rutzick, staff correspondent for Government Executive Magazine. NASA is retooling their Web site, and they’re doing their homework first. NASA Internet Services Manager Brian Dunbar is conducting extensive interviews with Web site users, including the media, such as this reporter. Dunbar says they’re “kicking...

Holocaust Museum, Google Highlight Darfur Atrocities

April 11, 2007 FROM NEXTGOV arrow The U.S. Holocaust Museum and Google Earth have teamed up to bring satellite map images of the effects of the atrocities in the Darfur region of the Sudan, the Associated Press reported yesterday. Holocaust Museum and Google Earth executives say the project, called the Crisis in Darfur, will bring the...

Calif. Tries RFID Regulation Again

April 10, 2007 FROM NEXTGOV arrow The California Senate plans to vote on bills this week that would limit the use of Radio Frequency Identification (RFID) technology in documents the government issues for personal identification, ComputerWorld reports. According to the article: Two of the bills would impose a three-year moratorium on the use of RFID technology...

IRS to Encrypt All Laptops

April 10, 2007 FROM NEXTGOV arrow The Internal Revenue Service has nearly completed encrypting all of its laptops in the wake of an internal audit that showed nearly half of its laptops tested for security contained unencrypted personal financial data, ComputerWorld reports. The article quotes IRS Commissioner Mark Everson, who was interviewed by National Public Radio...

Blog: Air Force Blocks Reader to Religious Site

April 9, 2007 FROM NEXTGOV arrow A blogger who writes the Philocrites blog (on "religion, liberalism and culture") claims that a reader accessing his site from an Air Force computer has been blocked from accessing his site. Chris Walton, who says he writes about the Unitarian Universalist movement, posted an item on his blog reporting that...

DISA to Use Army Contract for Service Architecture

April 6, 2007 FROM NEXTGOV arrow As part of its strategy to move away from building large proprietary information technology applications in favor of buying packaged commercial applications, the Defense Information Systems Agency said today that it will use an Army contract to buy the commercial services instead of developing its own contract for the services....

IGs Devoid of Creativity?

April 6, 2007 FROM NEXTGOV arrow In his April 4 Washington Post editorial, "The IG Ideology," Harvard professor and federal procurement expert Steve Kelman argues that federal government's inspectors general, by issuing critical reports on government operations, foster a culture of negativism and fear that perpetuates poor public management and retards efforts to improve government performance....

Another Stolen Government Laptop

March 26, 2007 FROM NEXTGOV arrow In the latest string of stolen laptops, an Army laptop containing names, social security numbers, and payroll information was stolen from a privately owned car at Ft. Monroe, Va., according to a statement by the public affairs office for the U.S. Army Training and Doctrine Command. The personal information for...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.