Results 131-140 of 146

HUD takes online case to real world court

January 20, 2000 In a case that could signal the use of new civil rights tools against on-line hate speech, the Department of Housing and Urban Development filed a housing discrimination lawsuit against a white supremacist whose Web site contained threats against a fair housing advocate. Even though the Web taken off...

Bill would put OMB in charge of computer security

November 24, 1999 Senate Government Affairs Committee Chairman Fred Thompson, R-Tenn., introduced a bill Friday to protect federal government information systems from cyber-attack, a move that could complicate the Clinton Administration's pending critical infrastructure protection plan. Dubbed the Government Information Security Act, S. 1993 is co-sponsored by ranking member Sen. Joseph Lieberman, D-Conn....

Congress refuses to fund security network

November 3, 1999 Less than one week before the Clinton Administration's proposed network security plan is slated to be unveiled and discussed, Congress has refused a last-minute request to provide $39 million in funds-including $8.4 million for the controversial Federal Intrusion Detection Network (FIDNet)-until at least January. Although House Majority Leader Richard Armey,...

Patent office reform effort hits hurdle

October 29, 1999 The Senate Judiciary Committee has eliminated a section of a House-passed bill that would permit the Patent and Trademark Office to reorganize itself as a more business-like operation, leaving chances of PTO's push to become a so-called performance-based organization in doubt. The elimination of the performance-based organization provision-a political football...

Justice Department plan could curtail FOIA

October 21, 1999 The Department of Justice is cultivating controversial plans to avoid or repeal portions of the Freedom of Information Act because of concerns the law might keep businesses from playing a crucial role in the Clinton Administration's computer network security plans. Department of Justice official Steve Mitchell said that in discussions...

Pentagon beefs up information security

October 19, 1999 Spurred by the rising threat of hacking attempts, the Pentagon is rethinking its approach to network security by requiring top-secret security clearances for all system administrators. The Pentagon also will roll out a system of authentication for all the agency's computer users, according to the Department of Defense's chief information...

GAO hacks into federal computers

October 7, 1999 Many of the largest federal agencies are not adequately protecting themselves against computer-based attacks, said a top General Accounting Office official whose agency successfully penetrated several of the government's mission-critical systems. In a report and testimony presented to a Senate Judiciary subcommittee on Wednesday, Jack Brock, director of government and...

Security network would protect federal systems

September 29, 1999 In a written response to House Majority Leader Richard Armey, R-Texas, a Clinton Administration official confirmed that the proposed Federal Intrusion Detection Network (FIDNet) would monitor only government computer networks, not those owned by the private sector. "As envisioned, FIDNet is being designed to monitor federal executive branch computer networks...

Cybersecurity experts follow Pentagon's lead

September 9, 1999 Frustrated at the inability of law enforcement to properly tackle the problem of hackers breaking into their computer networks, a growing plurality of corporate information technologists said they would step beyond simply securing their systems by counter-hacking attackers. These surprising results-possibly showing a trend toward "corporate vigilantism" in combating computer...

IRS pushes for more on-line tax filing

July 8, 1999 Heartened by the increasing numbers of individuals filing income taxes on-line, the Internal Revenue Service has turned its sights on boosting the rate at which small businesses file tax forms electronically. But before they can entice businesses to take the electronic plunge, officials at the agency say they are getting...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.