AUTHOR ARCHIVES

Brendan Sasso

National Journal Brendan Sasso is a technology correspondent for National Journal. He previously covered technology policy issues for The Hill and was a researcher and contributing writer for the 2012 edition of the Almanac of American Politics. He grew up in the San Francisco Bay Area and graduated from Claremont McKenna College.
Results 1-10 of 241

The Hill's Newest Encryption Fight -- Over Committee Turf

March 23, 2016 Amid a series of ter­ror at­tacks and the court battle between Apple and the FBI, few mem­bers of Con­gress have any idea how to solve the thorny prob­lems sur­round­ing gov­ern­ment ac­cess to en­cryp­ted data. But that hasn’t stopped them from fight­ing over who gets to come up with the solu­tions....

The Obama Administration’s Encryption Views Are All Over the Map

January 27, 2016 The wide­spread use of en­cryp­tion is mak­ing it in­creas­ingly dif­fi­cult for the gov­ern­ment to catch gang­sters, child pred­at­ors, and ter­ror­ists, a top Justice De­part­ment of­fi­cial warned Monday at a tech­no­logy-policy con­fer­ence. “The De­part­ment of Justice is com­pletely com­mit­ted to seek­ing and ob­tain­ing ju­di­cial au­thor­iz­a­tion for elec­tron­ic evid­ence col­lec­tion in all...

Obama Administration’s Encryption Views Are All Over the Map

January 26, 2016 FROM NEXTGOV arrow The wide­spread use of en­cryp­tion is mak­ing it in­creas­ingly dif­fi­cult for the gov­ern­ment to catch gang­sters, child pred­at­ors, and ter­ror­ists, a top Justice De­part­ment of­fi­cial warned Monday at a tech­no­logy-policy con­fer­ence. “The De­part­ment of Justice is com­pletely com­mit­ted to seek­ing and ob­tain­ing ju­di­cial au­thor­iz­a­tion for elec­tron­ic evid­ence col­lec­tion in all...

The White House's Encryption Views Are All Over the Map

January 26, 2016 The wide­spread use of en­cryp­tion is mak­ing it in­creas­ingly dif­fi­cult for the gov­ern­ment to catch gang­sters, child pred­at­ors, and ter­ror­ists, a top Justice De­part­ment of­fi­cial warned Monday at a tech­no­logy-policy con­fer­ence. “The De­part­ment of Justice is com­pletely com­mit­ted to seek­ing and ob­tain­ing ju­di­cial au­thor­iz­a­tion for elec­tron­ic evid­ence col­lec­tion in all...

Frustrated by Congress, Privacy Advocates Shift Fight to the States

January 21, 2016 FROM NEXTGOV arrow Frus­trated by con­gres­sion­al grid­lock, le­gis­lat­ors in 16 states and the Dis­trict of Columbia un­veiled an ar­ray of bills Wed­nesday aimed at bol­ster­ing pri­vacy pro­tec­tions. An­thony Romero, the ex­ec­ut­ive dir­ect­or of the Amer­ic­an Civil Liber­ties Uni­on, which co­ordin­ated the rol­lout of the bills, ar­gued that state ac­tion is ne­ces­sary be­cause Con­gress...

Privacy Advocates Shift Focus From Congress to States

January 21, 2016 Frus­trated by con­gres­sion­al grid­lock, le­gis­lat­ors in 16 states and the Dis­trict of Columbia un­veiled an ar­ray of bills Wed­nes­day aimed at bol­ster­ing pri­vacy pro­tec­tions. An­thony Romero, the ex­ec­ut­ive dir­ect­or of the Amer­ic­an Civil Liber­ties Uni­on, which co­ordin­ated the rol­lout of the bills, ar­gued that state ac­tion is ne­ces­sary be­cause Con­gress...

This Court Case Could be a Major Blow to FTC’s Data Security Efforts

January 14, 2016 FROM NEXTGOV arrow Most com­pan­ies fa­cing a law­suit from the Fed­er­al Trade Com­mis­sion try to settle as quickly as pos­sible. Fight­ing the FTC means years of ex­haust­ing and ex­pens­ive lit­ig­a­tion. The com­mis­sion doesn’t even have the au­thor­ity to im­pose fines for most vi­ol­a­tions, so a set­tle­ment usu­ally just means the com­pany has to...

Privacy Groups Blast Cyber-Sharing Included in Omnibus Spending Bill

December 17, 2015 FROM NEXTGOV arrow After years of de­bate and man­euv­er­ing, a ma­jor cy­ber­se­cur­ity bill is fi­nally on the fast track to ap­prov­al after law­makers at­tached it to a $1.1 tril­lion gov­ern­ment spend­ing pack­age early Wed­nes­day morn­ing. While busi­ness groups and na­tion­al se­cur­ity hawks are cheer­ing the news, it’s a ma­jor blow to pri­vacy ad­voc­ates,...

Ted Cruz Is Right: NSA Reform Bill Allows More Spying

December 16, 2015 FROM NEXTGOV arrow Sens. Marco Ru­bio and Ted Cruz clashed over their op­pos­ing votes on a key sur­veil­lance bill dur­ing Tues­day night’s GOP de­bate, with each sen­at­or try­ing to es­tab­lish him­self as the strongest on na­tion­al se­cur­ity. Ru­bio ac­cused Cruz of ham­per­ing in­tel­li­gence agen­cies by sup­port­ing the USA Free­dom Act, which ended the...

Ted Cruz Is Correct: The NSA Reform Bill Allows More Spying

December 16, 2015 Sens. Marco Ru­bio and Ted Cruz clashed over their op­pos­ing votes on a key sur­veil­lance bill dur­ing Tues­day night’s GOP de­bate, with each sen­at­or try­ing to es­tab­lish him­self as the strongest on na­tion­al se­cur­ity. Ru­bio ac­cused Cruz of ham­per­ing in­tel­li­gence agen­cies by sup­port­ing the USA Free­dom Act, which ended the...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.