Heather Greenfield

Results 51-60 of 61

Wireless tracking technology interests senators

July 12, 2006 Senators are becoming increasingly interested in a technology that can track everything from prescription drugs to aircraft parts, and also are likely to focus on the increasing controversy surrounding it. The Senate will launch the Radio Frequency Identification Device caucus at an event Thursday. Sens. Byron Dorgan, D-N.D., and John...

DHS lags in appointing cybersecurity czar

July 5, 2006 As the nation celebrated its birthday on Tuesday, those awaiting the appointment of a Cabinet-level cyber security czar are drawing attention to another July anniversary. It has been nearly a year since Homeland Security Department Secretary Michael Chertoff announced the creation of a position for an assistant cyber security czar....

Agencies lag in preparedness for upgraded Internet

June 26, 2006 Federal agencies face a deadline this week to show the Office of Management and Budget how prepared they are to switch to the next generation Internet. Depending on who you consult, the current Internet will run out of addresses sometime between 2009 and 2012. The new system is known to...

Victims of VA data theft offered free credit services

June 21, 2006 Veterans Affairs Department Secretary James Nicholson on Wednesday announced plans to provide free credit monitoring for millions of veterans and active-duty military personnel whose data was stolen. Nicholson said police have no further leads on what became of a laptop that contained personal information on 26.5 million people that was...

Expert shares ideas for protecting government data

June 20, 2006 A former White House cyber-security adviser to President Bush and former President Clinton on Tuesday offered a prescription to federal agencies and companies searching for ways to prevent security breaches. Richard Clarke said during a speech to government officials and companies that the security breaches at the Energy and Veterans...

Another federal breach exposes employee records

June 9, 2006 The Energy Department disclosed to Congress on Friday that it suffered a security breach from a hacker in September that compromised 1,500 personnel records. The news broke just as a House Energy and Commerce Oversight and Investigations Subcommittee was supposed to start a hearing on how secure Energy Department computers...

Panel to examine VA computer security practices

May 31, 2006 The committee that gave the Veterans Administration an "F" for its computer security practices plans a hearing June 8 to ask for an update on the department's reforms. House Government Reform Committee Staff Director Dave Marin said the focus of the hearing will be whether tighter laws are needed to...

CIA nominee's hearing may focus on wiretapping

May 8, 2006 The Senate confirmation hearing for Air Force Gen. Michael Hayden to head the CIA may turn into an investigation of a wiretapping program by the National Security Agency. At least that is the hope of some privacy rights groups. "It's an excellent opportunity for Congress to ask some tough questions...

Homeland Security agency to focus on information-sharing plans

February 2, 2006 The homeland security agency tasked with protecting critical infrastructures sees 2006 as a year to improve information-sharing among key sectors like electricity, water and information technology. The Homeland Security Department is expected to send the national infrastructure protection plan to the White House this month, according to Col. Robert Stephan,...

OMB: Agency information sharing key in Internet's technical upgrade

December 8, 2005 Federal agencies should actively share information as they transition to the technical parts of the next-generation Internet in time for the June 2007 deadline set by the Office of Management and Budget, according to a report released Thursday. The study, which was released during the annual IPv6 Summit in Reston,...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.