AUTHOR ARCHIVES

Results 41-50 of 73

The New House Republican Web Strategy: Just Add BuzzFeed

April 4, 2013 FROM NEXTGOV arrow What do cat pictures and GIFs have to do with Republican politics? Not a whole lot, at least right now. But beginning next week, that'll change. Staffers at the National Republican Congressional Committee are finishing up a site redesign that'll likely be rolled out this weekend. The new NRCC.org does...

This Defense Contractor Is Repeatedly Spear-Phishing 68,000 Innocent People

April 3, 2013 FROM NEXTGOV arrow One company with deep Washington connections is running a huge online scam. It involves tens of thousands of victims. And it's completely legal. The business in question is Northrop Grumman, one of the country's biggest defense firms. But before crying foul, know this: What the company's doing is actually a...

How Copyrights Suppress Innovation

April 2, 2013 FROM NEXTGOV arrow U.S. copyright protections don't promote innovation. They stifle it. That was one of the arguments that got intellectual-property reformer Derek Khanna fired from his job last year at the Republican Study Committee, a policy shop for the House GOP. The problem, Khanna said, was that too much copyright protection encourages...

FCC Race to Replace Obama's Top Tech Wonk Just Got More Interesting

March 28, 2013 FROM NEXTGOV arrow The odds of President Obama nominating a woman to head a top federal agency just got much better. Dozens of Senate Democrats have jointly sent a letter to the White House recommending that he choose a current Federal Communications Commission official, Jessica Rosenworcel, to succeed outgoing Julius Genachowski as chairman....

Will Businesses Be Forced to Say If They've Been Hacked?

March 26, 2013 FROM NEXTGOV arrow The idea is still a long way from reality, but Congress has taken the first step toward requiring companies to admit when their networks have been hacked. The proposed rule on data breaches appears as part of a larger draft bill being circulated in the House Judiciary Committee. On top...

How 'Privacy' Killed Google Reader

March 25, 2013 FROM NEXTGOV arrow When Google explained that it was shutting down its beloved news hub, Reader, it offered a couple of reasons for the decision: Not enough people were using it, and the company wanted to focus on a smaller set of more profitable enterprises. But the death of Google Reader may also...

Relive President Obama's Drone War, in Under 10 Seconds

March 25, 2013 FROM NEXTGOV arrow It began as a dribble. Then a trickle. And then, a torrent. More than 3,000 people have died as a result of U.S. drone strikes in Pakistan since 2004, according to the Bureau of Investigative Journalism. Of those, no more than about 1.5 percent have involved the deaths of high-profile...

Twitter Needs to Deal With Misinformation. Here's How

March 25, 2013 FROM NEXTGOV arrow Over at Poynter, Jeff Sonderman flags a site called Let Me Tweet That For You, which does exactly what its name suggests: It’s pretty simple—you type in a Twitter username and a message, and it generates a realistic-looking image of a tweet from that person. It even adds fake retweet...

The Unfinished Agenda of Outgoing FCC Chairman Genachowski

March 25, 2013 FROM NEXTGOV arrow Julius Genachowski is out as chairman of the Federal Communications Commission. Capping off a four-year stint as the country’s top telecom regulator, Genachowski was responsible for pushing network-neutrality rules as well as killing the T-Mobile/AT&T merger of 2011. But he also leaves a lot for his successor to do. Here's...

How Washington Plans to Regulate Your Bitcoins

March 22, 2013 FROM NEXTGOV arrow The Treasury Department has issued a memo explaining how it plans to oversee transactions made using Bitcoins, the online currency that's currently trading for $60 a pop. Although other U.S. agencies have done studies on virtual currencies, this marks the first time Washington has ever actually applied existing regulations to...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.