Results 81-90 of 432

EADS, BAE deal could roil U.S. defense industry

September 14, 2012 FROM NEXTGOV arrow The European Aeronautic Defense and Space Co. and BAE Systems of Britain are in merger talks to create the world's largest aerospace and defense company, the Wall Street Journal reports. EADS, the parent of aircraft maker Airbus, has struggled to expand in the crowded U.S. market. A deal with BAE,...

India, United States kick off cyber drills

September 13, 2012 FROM NEXTGOV arrow The Indian Computer Emergency Response Team kicked off a two-day joint offensive computer exercise with the United States on Wednesday, according to an Indian media report. The two agencies will launch phishing, network-probing, spam and malware attacks against each other and work out possible security ventures going forward, according to...

Aging activists draw attention to lax security in uranium storage complex

September 13, 2012 FROM NEXTGOV arrow Three anti-nuclear activists -- an 82-year-old nun, a gardener and a house painter -- who in July cut through fences of the complex housing the nation’s largest concentration of weapons-grade uranium, have caught lawmakers’ attention and raised questions about the facility’s lax security, reports indicate. The group slipped past security...

Obama administration pushes to extend electronic surveillance law

September 12, 2012 FROM NEXTGOV arrow The Obama Administration is pushing to renew a controversial 2008 surveillance law, warning that the country would lose an important intelligence-collection tool if Congress allows the measure to expire at the end of the year, the Wall Street Journal reports. The Foreign Intelligence Surveillance Act allows a secret national security...

U.S. missile defense strategy is flawed, panel finds

September 12, 2012 FROM NEXTGOV arrow The nation’s defenses against missile attacks have fallen short and left the U.S. vulnerable to some long-range strikes, according to a study chartered by Congress and reported by the New York Times. Domestic defenses could handle crude missiles but nothing more sophisticated, the report said. The assessment is a blow...

Japan creates cyber defense unit

September 11, 2012 FROM NEXTGOV arrow Japan’s Defense Ministry announced that it would create a unit dedicated to countering computer attacks and espionage, the Yomiuri Shimbun reports. The ministry plans to recruit 100 people to collect information about malware, study ways to respond to security threats, and take over operations currently conducted separately by ground, maritime...

Al Qaeda’s No. 2 in Yemen killed in airstrike

September 11, 2012 FROM NEXTGOV arrow An airstrike killed al Qaeda’s No. 2 leader in Yemen along with six others traveling with him in one car on Monday, the Associated Press reports. Saeed al-Shihri, a Saudi national who fought in Afghanistan and spent six years in the Guantanamo Bay military prison, was killed by a missile...

Army, Marines want to give combat troops access to ‘cyber fire support’

September 11, 2012 FROM NEXTGOV arrow The Army and Marine Corps are developing procedures for frontline troops to request offensive electronic tools to support ground missions, Foreign Policy reports. Such tools could plausibly infiltrate networks, disrupt communications, or deliver misleading messages to enemy computers. The Army currently uses a system called the Cyber Effects Request Format...

State-sponsored computer attacks grow increasingly ‘reckless,’ NSA official says

September 10, 2012 FROM NEXTGOV arrow Nations are increasingly employing computer attacks without "any sense of restraint," a National Security Agency official said on Friday at a forum in New York. "We're starting to see nation-state resources and expertise employed in what we would characterize as reckless and disruptive, destructive behaviors," Debora Plunkett, head of NSA's...

Pentagon receives ‘overwhelming response’ to Plan X cyber offensive

September 10, 2012 FROM NEXTGOV arrow Officials at the Defense Advanced Research Projects Agency have decided to postpone briefings and the release of solicitation documents for Plan X, a widely-anticipated funding initiative that will lay the foundation for the government’s push into offensive computer warfare operations. “Due to an unanticipated and overwhelming response from industry and...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.