Results 131-140 of 146

HUD takes online case to real world court

January 20, 2000 In a case that could signal the use of new civil rights tools against on-line hate speech, the Department of Housing and Urban Development filed a housing discrimination lawsuit against a white supremacist whose Web site contained threats against a fair housing advocate. Even though the Web taken off...

Bill would put OMB in charge of computer security

November 24, 1999 Senate Government Affairs Committee Chairman Fred Thompson, R-Tenn., introduced a bill Friday to protect federal government information systems from cyber-attack, a move that could complicate the Clinton Administration's pending critical infrastructure protection plan. Dubbed the Government Information Security Act, S. 1993 is co-sponsored by ranking member Sen. Joseph Lieberman, D-Conn....

Congress refuses to fund security network

November 3, 1999 Less than one week before the Clinton Administration's proposed network security plan is slated to be unveiled and discussed, Congress has refused a last-minute request to provide $39 million in funds-including $8.4 million for the controversial Federal Intrusion Detection Network (FIDNet)-until at least January. Although House Majority Leader Richard Armey,...

Patent office reform effort hits hurdle

October 29, 1999 The Senate Judiciary Committee has eliminated a section of a House-passed bill that would permit the Patent and Trademark Office to reorganize itself as a more business-like operation, leaving chances of PTO's push to become a so-called performance-based organization in doubt. The elimination of the performance-based organization provision-a political football...

Justice Department plan could curtail FOIA

October 21, 1999 The Department of Justice is cultivating controversial plans to avoid or repeal portions of the Freedom of Information Act because of concerns the law might keep businesses from playing a crucial role in the Clinton Administration's computer network security plans. Department of Justice official Steve Mitchell said that in discussions...

Pentagon beefs up information security

October 19, 1999 Spurred by the rising threat of hacking attempts, the Pentagon is rethinking its approach to network security by requiring top-secret security clearances for all system administrators. The Pentagon also will roll out a system of authentication for all the agency's computer users, according to the Department of Defense's chief information...

GAO hacks into federal computers

October 7, 1999 Many of the largest federal agencies are not adequately protecting themselves against computer-based attacks, said a top General Accounting Office official whose agency successfully penetrated several of the government's mission-critical systems. In a report and testimony presented to a Senate Judiciary subcommittee on Wednesday, Jack Brock, director of government and...

Security network would protect federal systems

September 29, 1999 In a written response to House Majority Leader Richard Armey, R-Texas, a Clinton Administration official confirmed that the proposed Federal Intrusion Detection Network (FIDNet) would monitor only government computer networks, not those owned by the private sector. "As envisioned, FIDNet is being designed to monitor federal executive branch computer networks...

Cybersecurity experts follow Pentagon's lead

September 9, 1999 Frustrated at the inability of law enforcement to properly tackle the problem of hackers breaking into their computer networks, a growing plurality of corporate information technologists said they would step beyond simply securing their systems by counter-hacking attackers. These surprising results-possibly showing a trend toward "corporate vigilantism" in combating computer...

IRS pushes for more on-line tax filing

July 8, 1999 Heartened by the increasing numbers of individuals filing income taxes on-line, the Internal Revenue Service has turned its sights on boosting the rate at which small businesses file tax forms electronically. But before they can entice businesses to take the electronic plunge, officials at the agency say they are getting...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.