AUTHOR ARCHIVES

Results 31-40 of 235

Busting the Myth of the Superhacker

April 17, 2007 FROM NEXTGOV arrow Everyone knows the legend of the superhacker, the supersmart electronic code breaker tearing through security barriers. But University of Colorado Law School professor Paul Ohm writes that the incidence and danger of superhackers, or whom he calls "superusers," tend to be exaggerated. Ohm cites a study by two University of...

The Bad-Boss Pattern

April 17, 2007 FROM NEXTGOV arrow In the April 9 issue of New York Magazine, author Steve Fishman writes an in-depth article laying out why so many workers dislike their bosses. Fishman quotes Robert Sutton, a Stanford professor who studies the topic, who says bosses tend to give off "subtle nasty moves like glaring and condescending...

Former CA Chief 'Masterminded Fraud'

April 16, 2007 FROM NEXTGOV arrow A culture of corruption pervaded the security software company and government contractor CA Inc. almost from its inception, according to a report issued by the company's corporate board Thursday. According to the report, founder and former CEO Charles Wang oversaw “accounting fraud lasting more than a decade at the software...

Outside the Box

April 15, 2007 With some hesitation, the Defense Department is starting to give open source products a whirl. One day a few years ago in the bowels of U.S. Central Command's central headquarters in Tampa, Fla., something new awaited the techies who support the Global Command and Control System. The military relies on...

How to Foil a Fingerprint Scanner

April 13, 2007 FROM NEXTGOV arrow Biometrics is becoming more popular in government as a security tool. Using digital fingerprints is a favored biometric because of its supposed infallibility â€" a belief that this video from the Discovery Channel show "MythBusters" proves to be misplaced. In it, two innovative hackers manage to foil a door lock...

Tip Thursday - Your IP Address

April 12, 2007 FROM NEXTGOV arrow Welcome to Tech Insider’s Tip Thursday, in which we bring you computing tips and computing information you can easily apply at your desktop. This week: View your IP address. As a follow up to last week’s post on anonymous surfing, we thought it would be useful to remind you that...

White House Loses RNC E-Mails

April 12, 2007 FROM NEXTGOV arrow An undetermined number of e-mails sent by White House aides from a Republican National Committee account have been lost, the Associated Press reported Wednesday. White House spokesman Scott Stanzel said some e-mails were lost because they had no clear policy for archiving the emails. "This sounds like the administration's version...

Comic Strip Takes On Hatch Act

April 11, 2007 FROM NEXTGOV arrow The two latest Candorville comic strips (one that ran April 10 and another that ran today, April 11) have an eerily familiar ring to them -- especially for anyone who has followed the congressional hearing investigating General Services Administrator Lurita Doan's role in the possible violation of a law that...

Vista Security Concerns Surface

April 11, 2007 FROM NEXTGOV arrow One of Microsoft’s main selling points of its new operating system Vista has been the platform's built-in security features. Beefing up security also was the primary reason why the Office of Management and Budget last month issued a mandate requiring all agencies to follow a standard Microsoft platform. But, writes...

More Data Losses Reported

April 11, 2007 FROM NEXTGOV arrow Continuing a long streak of government data losses, the Department of Community Health in Georgia disclosed yesterday that a contractor lost a CD containing the personal information of 2.9 million Georgians, according to CNET news. The department's claim processor contractor, Dallas-based Affiliated Computer Services, lost the disc sometime after March...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.