AUTHOR ARCHIVES

Results 21-30 of 54

How Petraeus Turned the CIA into the Good Guys in Benghazi

May 22, 2013 How did the CIA become the hero in the Benghazi talking point controversy? The Republican theory of the case is that the CIA provided mostly correct talking points (with one big flaw — it blamed spontaneous protests), which the State Department and the White House then edited into misleading mush...

Huma Abedin Had an Incredibly Sweet Deal at the State Department

May 17, 2013 Huma Abedin remained Hillary Clinton's deputy chief of staff when she came back from maternity leave in June 2012, even though she worked part-time from her home in New York and was allowed to start a side gig as a consultant. Abedin was paid $135,000 by the State Department in...

Third Military Man in Charge of Stopping Harassment Arrested for Doing Just That

May 17, 2013 The U.S. military has now had three men in charge of programs to limit harassment or violence against women accused of similar crimes revolving around harassment and violence against women in the same month. It's only May 16th. Army Lt. Col. Darin Haas, who ran Fort Campbell's sexual harassment program,...

Air Force Sexual Assault Prevention Chief Arrested for Sexual Assault

May 7, 2013 The Air Force officer in charge of the Air Force's Sexual Assault Prevention and Response Office has been charged with sexual battery. Lt. Col. Jeffrey Krusinski was arrested on Sunday for allegedly grabbing a woman's breasts and butt in a parking lot in Arlington, Virginia. According to police, the woman...

Big, Dumb Government: Why the GOP Is Winning the Sequester

April 30, 2013 Why hasn't the American public risen up in fury at Republicans over the sequester's annoyances and inconveniences, as President Obama had clearly hoped? Because the annoying things about the sequester perfectly play into decades worth of Republican talking points about government being dumb and wasteful and run by people who...

When IEDs Come Home: What Boston Looked Like to Iraq Veterans

April 17, 2013 FROM NEXTGOV arrow What happened at the Boston Marathon was inconceivable, horrific, shocking to most who have seen the videos and photos, but there are lots of Americans for whom the scene was appallingly familiar: veterans of the wars in Iraq and Afghanistan. I spoke to five men who served with my husband...

After a Bombing in Boston, All Quiet In Washington

April 15, 2013 President Obama addressed a nation uneasy from a day of viewing photos of bloody Americans and did not tell them much. "We still do not know who did this or why. And people shouldn't jump to conclusions before we have all the facts," he said on Monday evening. "But make...

Quiz: Which Budget Is Right for You?

April 11, 2013 Whose budget should you support based on naked self-interest: Paul Ryan's? The president's? A political group you've never heard of? The Atlantic Wire has created this handy quiz to help you decide whose budget is best for your actual life. We took a look at the various plans under consideration,...

Analysis: Why the GOP Should Embrace Federally Funded Studies of Ducks

April 3, 2013 One of conservatives' favorite examples of wasteful government spending in recent weeks has been a federally funded study of the duck reproductive system. As the Republican Party looks to recover from its 2012 losses, sure, it should appeal to a wider audience by talking more about immigration and talking less...

Congress Continues the War on Gun Data

March 13, 2013 FROM NEXTGOV arrow Republican senators inserted several gun rights measures into a bill to fund the government through September, including one that says the Bureau of Alcohol, Tobacco, Firearms, and Explosives must attach a disclaimer to any gun data saying it "cannot be used to draw broad conclusions about fire-arms-related crimes." The gun...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.