Results 11-20 of 121

Small Florida firm navigates federal procurement market

May 2, 2003 Many companies eager to tap the growing federal market for security technology have hired Washington lobbyists to try to help them become players in the competitive market, but one small Florida firm decided to go it alone-and succeeded. Early last month, Ideal Technology, a computer-forensics company, won a $65,000, six-month...

Think tank urges Democrats to focus on government reform

May 1, 2003 Democrats need to make reforming government, including overhauling the civil service structure, a key policy issue, or they will continue to be painted as the party that supports "big government," a Democratic think tank asserted Thursday. In a paper titled "Network Government for the Digital Age," the Progressive Policy Institute...

Homeland chief urges firms to bolster cybersecurity

April 30, 2003 Homeland Security Secretary Tom Ridge underscored to technology leaders Tuesday evening that the private sector should be worried about computer attacks and must do more to secure their networks. At a speech before the Northern Virginia Technology Council, Ridge cited a poll showing that 90 percent of CEOs do not...

Venture capitalists urge small tech firms to enter government market

April 14, 2003 Nine months ago, Bill Schroeder, a top executive with the Silicon Valley cybersecurity firm Vormetric, was startled by a venture capitalist's suggestion that the 35-person firm develop a strategy for selling its technology to the federal government in addition to its commercial plans. Schroeder, the CEO of the San Jose,...

Homeland R&D chief laments lack of staff

April 10, 2003 Hundreds of companies have ideas for improving efforts to secure the United States, Homeland Security Undersecretary for Science and Technology Charles McQueary told Congress Thursday. He just needs the employees to evaluate which should get part of the the directorate's $803 million budget request for fiscal 2004 to fund research...

Homeland privacy officer to review passenger-screening system

April 9, 2003 Homeland Security Secretary Tom Ridge on Wednesday told a congressional panel that the government will not implement a pilot version of a controversial program for screening airline passengers until a privacy expert examines it. Ridge told the Senate Commerce Committee that the Transportation Security Administration (TSA) will not test the...

Red tape could curb firms' reconstruction work in Iraq

April 4, 2003 While some U.S. companies may be poised to help with reconstruction and humanitarian aid in Iraq, they will not be able to conduct business there until Congress repeals a 1990 law that bars American firms from doing any work in the country. Hence, the National Foreign Trade Council (NFTC) will...

FBI to maintain separate information analysis center

April 1, 2003 The FBI will maintain a separate information-analysis center even with the creation of a Terrorist Threat Integration Center (TTIC), Attorney General John Ashcroft told a Senate panel on Tuesday. Though the integration center is expected to be a hub for analyzing all terrorist information collected by the government, Ashcroft said...

FBI chief details progress on upgrading computer systems

March 27, 2003 FBI Director Robert Mueller told a congressional panel on Thursday that the bureau has made significant progress updating its computer systems and that one operations center soon will connect and manage all of the bureau's computers. Mueller told the House Appropriations subcommittee with jurisdiction over the FBI that a wide-area...

Study shows agencies, firms forego investment in security training

March 18, 2003 Companies and government agencies are increasingly aware of the importance of computer security and yet most spend less than 5 percent of their budget on security training for their information technology employees, according to a study released Tuesday. Through the 638 members of the Computing Technology Industry Association who responded...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.