Results 831-840 of 861

Plea Continues For Cross-Agency Spending

April 12, 2007 FROM NEXTGOV arrow The following post was written by Tim Clark, editor and president of Government Executive. It was a long day of technology talk at the Press Club yesterday. The security event (see below) began at 7:30 a.m., and another event, sponsored by the Association for Federal Information Resources Management ended at...

An Explanation of OMB's Security Mandate

April 12, 2007 FROM NEXTGOV arrow The following post was written by Tim Clark, editor and president of Government Executive. A bit of skepticism has been flying around about the government’s effort to achieve significant advances in cybersecurity by standardizing agencies’ use of the Microsoft Windows operating system. Or so our own reporting would suggest. But...

NASA Asks Users' Input for Web Re-Design

April 12, 2007 FROM NEXTGOV arrow This post was written by Karen Rutzick, staff correspondent for Government Executive Magazine. NASA is retooling their Web site, and they’re doing their homework first. NASA Internet Services Manager Brian Dunbar is conducting extensive interviews with Web site users, including the media, such as this reporter. Dunbar says they’re “kicking...

Holocaust Museum, Google Highlight Darfur Atrocities

April 11, 2007 FROM NEXTGOV arrow The U.S. Holocaust Museum and Google Earth have teamed up to bring satellite map images of the effects of the atrocities in the Darfur region of the Sudan, the Associated Press reported yesterday. Holocaust Museum and Google Earth executives say the project, called the Crisis in Darfur, will bring the...

Calif. Tries RFID Regulation Again

April 10, 2007 FROM NEXTGOV arrow The California Senate plans to vote on bills this week that would limit the use of Radio Frequency Identification (RFID) technology in documents the government issues for personal identification, ComputerWorld reports. According to the article: Two of the bills would impose a three-year moratorium on the use of RFID technology...

IRS to Encrypt All Laptops

April 10, 2007 FROM NEXTGOV arrow The Internal Revenue Service has nearly completed encrypting all of its laptops in the wake of an internal audit that showed nearly half of its laptops tested for security contained unencrypted personal financial data, ComputerWorld reports. The article quotes IRS Commissioner Mark Everson, who was interviewed by National Public Radio...

Blog: Air Force Blocks Reader to Religious Site

April 9, 2007 FROM NEXTGOV arrow A blogger who writes the Philocrites blog (on "religion, liberalism and culture") claims that a reader accessing his site from an Air Force computer has been blocked from accessing his site. Chris Walton, who says he writes about the Unitarian Universalist movement, posted an item on his blog reporting that...

DISA to Use Army Contract for Service Architecture

April 6, 2007 FROM NEXTGOV arrow As part of its strategy to move away from building large proprietary information technology applications in favor of buying packaged commercial applications, the Defense Information Systems Agency said today that it will use an Army contract to buy the commercial services instead of developing its own contract for the services....

IGs Devoid of Creativity?

April 6, 2007 FROM NEXTGOV arrow In his April 4 Washington Post editorial, "The IG Ideology," Harvard professor and federal procurement expert Steve Kelman argues that federal government's inspectors general, by issuing critical reports on government operations, foster a culture of negativism and fear that perpetuates poor public management and retards efforts to improve government performance....

Another Stolen Government Laptop

March 26, 2007 FROM NEXTGOV arrow In the latest string of stolen laptops, an Army laptop containing names, social security numbers, and payroll information was stolen from a privately owned car at Ft. Monroe, Va., according to a statement by the public affairs office for the U.S. Army Training and Doctrine Command. The personal information for...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.