AUTHOR ARCHIVES

Results 61-70 of 73

You Call This an Army? The Terrifying Shortage of U.S. Cyberwarriors

February 25, 2013 FROM NEXTGOV arrow When the Soviet Union launched the first satellite in 1957, it set off an intellectual arms race that led to more than $1 billion of federal investment in science education. Within a decade, Americans were sending their own expeditions to outer space. Presidents and other public figures since then have...

One If By Land, Two If By Sea, 10101101 If By Cyberspace

February 20, 2013 FROM NEXTGOV arrow Until very recently, America’s battles have all been waged somewhere in physical space—on land, in the air, on water or in outer space. Many of these domains come along with inherent features that make life harder or easier in battle. History tells us, for example, that defenders generally have an...

It's Not Just You: Chinese Hackers Are Terrible at Making Passwords, Too

February 19, 2013 FROM NEXTGOV arrow When The New York Times and other news outlets reported being the victims of a massive, years-long cyberattack, it set off a rash of concerns about online security and personal Internet hygiene, reinforcing plenty of old, enduring lessons: Choose strong passwords; don’t click on links from strangers (or strange links...

Rockefeller, Lead Senate Player on Cyber, Seeks To Win Over Business

February 19, 2013 FROM NEXTGOV arrow A week after President Obama unveiled an executive order aimed at protecting the country from cyberattacks, attention is turning to Congress, where Sen. Jay Rockefeller, D-W.Va., is taking the lead on crafting broad legislation to fight cybercrimes and combat threats to critical infrastructure such as power grids and water supplies....

Why Some Privacy Advocates Are Grinning Over Obama's Cybersecurity Order

February 13, 2013 FROM NEXTGOV arrow The cybersecurity order President Obama introduced last night sets up some new ways for Washington to share threat information with the private sector. For now, it’ll be a one-way relationship: the government can notify private businesses if they’ve been targeted for cyberattack, but the businesses won’t be giving anything to...

Could a White House Order on Cybersecurity Drop This Week?

February 11, 2013 FROM NEXTGOV arrow In the wake of recent high-profile hacking incidents at The New York Times and The Washington Post, the Obama administration has been speeding toward a long-anticipated executive order that would create ways for the federal government to share information with the private sector about potential cyberthreats. According to a Bloomberg...

The Supercharged Technology Behind the Nemo Blizzard Emergency Alert

February 8, 2013 FROM NEXTGOV arrow With Winter Storm Nemo bearing down on the Northeast, many Americans are bracing for a blast of snow — but some Thursday got a blast of a different kind instead. Thousands of Verizon users reported getting an emergency alert about the coming blizzard on their cell phones that looked a...

Congress' Plan to Stop Exporting Technology to Repressive Regimes

February 7, 2013 FROM NEXTGOV arrow When a U.S. company wants to export military technology, it has to go through a rigorous approval process in Washington. That’s because, of course, if it ends up in the wrong hands, the technology could interfere with U.S. foreign policy, destabilize conflict-prone regions, or worse. Now one member of Congress...

Why has Iran slowed its nuclear program on purpose?

January 29, 2013 FROM NEXTGOV arrow Israeli Prime Minister Benjamin Netanyahu wasn't afraid to get dramatic at the United Nations last year when, in a speech about the dangers of Iran's alleged nuclear program, he used a prop. Two, actually: a chart and a red marker. In case the seriousness of the threat wasn't clear, Netanyahu...

How John Kerry could out-Internet Hillary Clinton as Secretary of State

January 8, 2013 FROM NEXTGOV arrow You might call Hillary Clinton the ur-diplomat of the digital age. Under her guidance, the U.S. State Department embraced new technology in a way no secretary of state has done since the fax machine. Forbetter or worse, Clinton added a new dimension to the way Washington engages with the rest...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.