AUTHOR ARCHIVES

Results 361-370 of 432

The Cyberwar Echo Chamber

September 17, 2010 FROM NEXTGOV arrow Pentagon officials are starting to repeat one another's cyberwar rhetoric. Hello, is this an echo chamber? On Wednesday, Deputy Defense Secretary William Lynn III discussed the military's cybersecurity strategy after meetings at NATO and the Supreme Headquarters Allied Powers Europe. "Like air, sea, land and space, we're going to have...

Iran, State, an App and Fingerpointing

September 16, 2010 FROM NEXTGOV arrow Technology designed to circumvent Internet censorship by Iranian officials has been found to be riddled with security loopholes, raising questions on how the State Department could have approved it for distribution in Iran. Haystack's website boasted that the tool employed "a sophisticated mathematical formula to hide users' real Internet traffic...

Cementing the State-Silicon Valley Relationship

September 9, 2010 FROM NEXTGOV arrow State Department Policy Planning staff official Jared Cohen announced this week that he would be leaving the administration to head a new "think/do tank" at Google, a move that cements the growing link between Silicon Valley and the State Department. "I view my departure from government not as a farewell,...

Data.gov To House New APIs

June 21, 2010 FROM NEXTGOV arrow A series of new application programming interfaces - tools that facilitate interaction between datasets and other software programs - will make it easier for developers to play and interact with the content on Data.gov, the online repository of federal information and a cornerstone of the open government initiative. But those...

Ready For Telework?

June 17, 2010 FROM NEXTGOV arrow Federal employees may want to telework, but only a small number have access to the resources and support necessary to do so, according to a new survey. A June 15 survey from Fedscoop, a government news aggregation site, revealed that the federal government lags behind the private sector in terms...

Supreme Court upholds search of a police officer's messages

June 17, 2010 FROM NEXTGOV arrow The Supreme Court on Thursday ruled a search of a police officer's personal text messages on a government-issued pager was constitutional. But it avoided tackling a thornier and broader question: What level of privacy can public employees expect on work-provided communications devices? In City of Ontario v. Quon, the high...

From Nextgov.com: Supreme Court upholds search of a police officer's messages

June 17, 2010 The Supreme Court on Thursday ruled a search of a police officer's personal text messages on a government-issued pager was constitutional. But it avoided tackling a thornier and broader question: What level of privacy can public employees expect on work-provided communications devices? Read the full story on Nextgov.com.

NASA sued for failing to disclose contracting information

June 15, 2010 In a bid to hold NASA accountable to meeting federally mandated goals for small business contracting, advocates demanded for the third time that the agency release contracting information for its space operations. The American Small Business League filed a lawsuit on June 8 asking the U.S. District Court for the...

Twitter Seeks "Government Liaison"

June 11, 2010 FROM NEXTGOV arrow Twitter announced this week that it would be hiring its first DC-based "government liaison" to boost government presence on the social networking site. This sparked off an intense debate over the kind of person it would take to get lawmakers and bureaucrats to embrace social media. Alan Silberberg, the chief...

Drones: Playstation Mentality?

June 9, 2010 FROM NEXTGOV arrow As the CIA increasingly is making drone strikes the centerpiece in the war on terror, it is shaking the boundaries of international law and risking "developing a 'Playstation' mentality to killing," warned a senior United Nations official last month. Philip Alston, the United Nations special rapporteur on extrajudicial executions, pointed...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.