Results 31-40 of 235

Busting the Myth of the Superhacker

April 17, 2007 FROM NEXTGOV arrow Everyone knows the legend of the superhacker, the supersmart electronic code breaker tearing through security barriers. But University of Colorado Law School professor Paul Ohm writes that the incidence and danger of superhackers, or whom he calls "superusers," tend to be exaggerated. Ohm cites a study by two University of...

The Bad-Boss Pattern

April 17, 2007 FROM NEXTGOV arrow In the April 9 issue of New York Magazine, author Steve Fishman writes an in-depth article laying out why so many workers dislike their bosses. Fishman quotes Robert Sutton, a Stanford professor who studies the topic, who says bosses tend to give off "subtle nasty moves like glaring and condescending...

Former CA Chief 'Masterminded Fraud'

April 16, 2007 FROM NEXTGOV arrow A culture of corruption pervaded the security software company and government contractor CA Inc. almost from its inception, according to a report issued by the company's corporate board Thursday. According to the report, founder and former CEO Charles Wang oversaw “accounting fraud lasting more than a decade at the software...

Outside the Box

April 15, 2007 With some hesitation, the Defense Department is starting to give open source products a whirl. One day a few years ago in the bowels of U.S. Central Command's central headquarters in Tampa, Fla., something new awaited the techies who support the Global Command and Control System. The military relies on...

How to Foil a Fingerprint Scanner

April 13, 2007 FROM NEXTGOV arrow Biometrics is becoming more popular in government as a security tool. Using digital fingerprints is a favored biometric because of its supposed infallibility â€" a belief that this video from the Discovery Channel show "MythBusters" proves to be misplaced. In it, two innovative hackers manage to foil a door lock...

Tip Thursday - Your IP Address

April 12, 2007 FROM NEXTGOV arrow Welcome to Tech Insider’s Tip Thursday, in which we bring you computing tips and computing information you can easily apply at your desktop. This week: View your IP address. As a follow up to last week’s post on anonymous surfing, we thought it would be useful to remind you that...

White House Loses RNC E-Mails

April 12, 2007 FROM NEXTGOV arrow An undetermined number of e-mails sent by White House aides from a Republican National Committee account have been lost, the Associated Press reported Wednesday. White House spokesman Scott Stanzel said some e-mails were lost because they had no clear policy for archiving the emails. "This sounds like the administration's version...

Comic Strip Takes On Hatch Act

April 11, 2007 FROM NEXTGOV arrow The two latest Candorville comic strips (one that ran April 10 and another that ran today, April 11) have an eerily familiar ring to them -- especially for anyone who has followed the congressional hearing investigating General Services Administrator Lurita Doan's role in the possible violation of a law that...

Vista Security Concerns Surface

April 11, 2007 FROM NEXTGOV arrow One of Microsoft’s main selling points of its new operating system Vista has been the platform's built-in security features. Beefing up security also was the primary reason why the Office of Management and Budget last month issued a mandate requiring all agencies to follow a standard Microsoft platform. But, writes...

More Data Losses Reported

April 11, 2007 FROM NEXTGOV arrow Continuing a long streak of government data losses, the Department of Community Health in Georgia disclosed yesterday that a contractor lost a CD containing the personal information of 2.9 million Georgians, according to CNET news. The department's claim processor contractor, Dallas-based Affiliated Computer Services, lost the disc sometime after March...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.