Results 61-70 of 73

You Call This an Army? The Terrifying Shortage of U.S. Cyberwarriors

February 25, 2013 FROM NEXTGOV arrow When the Soviet Union launched the first satellite in 1957, it set off an intellectual arms race that led to more than $1 billion of federal investment in science education. Within a decade, Americans were sending their own expeditions to outer space. Presidents and other public figures since then have...

One If By Land, Two If By Sea, 10101101 If By Cyberspace

February 20, 2013 FROM NEXTGOV arrow Until very recently, America’s battles have all been waged somewhere in physical space—on land, in the air, on water or in outer space. Many of these domains come along with inherent features that make life harder or easier in battle. History tells us, for example, that defenders generally have an...

It's Not Just You: Chinese Hackers Are Terrible at Making Passwords, Too

February 19, 2013 FROM NEXTGOV arrow When The New York Times and other news outlets reported being the victims of a massive, years-long cyberattack, it set off a rash of concerns about online security and personal Internet hygiene, reinforcing plenty of old, enduring lessons: Choose strong passwords; don’t click on links from strangers (or strange links...

Rockefeller, Lead Senate Player on Cyber, Seeks To Win Over Business

February 19, 2013 FROM NEXTGOV arrow A week after President Obama unveiled an executive order aimed at protecting the country from cyberattacks, attention is turning to Congress, where Sen. Jay Rockefeller, D-W.Va., is taking the lead on crafting broad legislation to fight cybercrimes and combat threats to critical infrastructure such as power grids and water supplies....

Why Some Privacy Advocates Are Grinning Over Obama's Cybersecurity Order

February 13, 2013 FROM NEXTGOV arrow The cybersecurity order President Obama introduced last night sets up some new ways for Washington to share threat information with the private sector. For now, it’ll be a one-way relationship: the government can notify private businesses if they’ve been targeted for cyberattack, but the businesses won’t be giving anything to...

Could a White House Order on Cybersecurity Drop This Week?

February 11, 2013 FROM NEXTGOV arrow In the wake of recent high-profile hacking incidents at The New York Times and The Washington Post, the Obama administration has been speeding toward a long-anticipated executive order that would create ways for the federal government to share information with the private sector about potential cyberthreats. According to a Bloomberg...

The Supercharged Technology Behind the Nemo Blizzard Emergency Alert

February 8, 2013 FROM NEXTGOV arrow With Winter Storm Nemo bearing down on the Northeast, many Americans are bracing for a blast of snow — but some Thursday got a blast of a different kind instead. Thousands of Verizon users reported getting an emergency alert about the coming blizzard on their cell phones that looked a...

Congress' Plan to Stop Exporting Technology to Repressive Regimes

February 7, 2013 FROM NEXTGOV arrow When a U.S. company wants to export military technology, it has to go through a rigorous approval process in Washington. That’s because, of course, if it ends up in the wrong hands, the technology could interfere with U.S. foreign policy, destabilize conflict-prone regions, or worse. Now one member of Congress...

Why has Iran slowed its nuclear program on purpose?

January 29, 2013 FROM NEXTGOV arrow Israeli Prime Minister Benjamin Netanyahu wasn't afraid to get dramatic at the United Nations last year when, in a speech about the dangers of Iran's alleged nuclear program, he used a prop. Two, actually: a chart and a red marker. In case the seriousness of the threat wasn't clear, Netanyahu...

How John Kerry could out-Internet Hillary Clinton as Secretary of State

January 8, 2013 FROM NEXTGOV arrow You might call Hillary Clinton the ur-diplomat of the digital age. Under her guidance, the U.S. State Department embraced new technology in a way no secretary of state has done since the fax machine. Forbetter or worse, Clinton added a new dimension to the way Washington engages with the rest...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.


When you download a report, your information may be shared with the underwriters of that document.