Heather Greenfield

Results 21-30 of 61

Mobility of federal workers hinders data security

July 19, 2007 As the federal workforce becomes more mobile, a growing challenge for agency chief information officers is how to encrypt information and share it, according to the Justice Department's chief information officer. Vance Hitch spoke Thursday to information technology contractors at a government symposium organized by Symantec. "Thumb drives are everywhere,...

Privacy officials discuss government data breaches

July 18, 2007 Days after another publicized data breach, this time at the Transportation Security Administration, chief privacy officers from federal agencies gathered Wednesday for a conference on how to better secure personal data. Hugo Teufel, chief privacy officer at the Homeland Security Department, said whenever humans are involved, accidents can happen. TSA,...

Standards body drafts guide on preventing data breaches

June 11, 2007 The National Institute for Standards and Technology has released a draft of its new guide to better protect federal agencies from data breaches. The 387-page guide is designed to help agency technical teams evaluate whether the security controls they have actually work as intended to protect information systems from being...

A year after major breach, data-security bills stalled

May 22, 2007 Tuesday was the one-year mark since Congress learned of a stolen laptop computer that contained personal data on 26.5 million veterans and active-duty military personnel. But while Congress last year cleared data-protection measures aimed specifically the Veterans Affairs Department whose employee lost that computer, it has not passed broader legislation....

Report on smart tags includes security, privacy warnings

May 1, 2007 Businesses and federal agencies using radio-frequency identification devices should regularly evaluate security and privacy risks, according to a new report on RFID best practices from the National Institute of Standards and Technology. RFID devices send or receive audio signals, transmitting information like serial numbers of products within warehouses. "RFID tags,...

New grades prompt closer look at cyber standards

April 13, 2007 Federal agencies received their report cards for compliance with computer-security rules Thursday, but some of those in charge of making the security improvements question whether the rules themselves are making the grade. The Merlin International Federal Research Consortium has released a report that asked federal chief information security officers to...

Pentagon official discusses move to new version of Internet

March 27, 2007 RESTON, Va. -- While the Defense Department tends to lead federal agencies in adopting technological advances, the military predicts that the switch to the next generation of the Internet will be driven by the need to use the next big "killer app." Maj. Gen. Dennis Moran, who directs command, control,...

Homeland Security secretary highlights importance of technology

March 15, 2007 TYSONS CORNER, Va. -- Homeland Security Secretary Michael Chertoff on Thursday outlined the transition to improved technology to check people and cargo entering the country. During a morning speech to the Northern Virginia Technology Council, Chertoff expressed surprise at the packed ballroom of 600 high-tech executives before launching into his...

Federal officials urge industry to better protect IT systems

March 9, 2007 Greg Garcia, the Homeland Security Department's cyber czar, is looking at incentives to encourage businesses to better protect their networks and sensitive information, and he hopes Congress does the same. In response to questions at a two-day Visa Security Summit this week, Garcia said he likes the idea of a...

Panelists struggle to find answers to cyber threats

March 2, 2007 Greg Garcia, the cyber-security czar for the Homeland Security Department, said that when customers or partners refuse to do business with companies that do not meet certain cyber standards, "that's when the groundswell [for improving security] is going to come." Speaking Thursday to the Armed Forces Communications and Electronics Association,...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.