Heather Greenfield

Results 51-60 of 61

Wireless tracking technology interests senators

July 12, 2006 Senators are becoming increasingly interested in a technology that can track everything from prescription drugs to aircraft parts, and also are likely to focus on the increasing controversy surrounding it. The Senate will launch the Radio Frequency Identification Device caucus at an event Thursday. Sens. Byron Dorgan, D-N.D., and John...

DHS lags in appointing cybersecurity czar

July 5, 2006 As the nation celebrated its birthday on Tuesday, those awaiting the appointment of a Cabinet-level cyber security czar are drawing attention to another July anniversary. It has been nearly a year since Homeland Security Department Secretary Michael Chertoff announced the creation of a position for an assistant cyber security czar....

Agencies lag in preparedness for upgraded Internet

June 26, 2006 Federal agencies face a deadline this week to show the Office of Management and Budget how prepared they are to switch to the next generation Internet. Depending on who you consult, the current Internet will run out of addresses sometime between 2009 and 2012. The new system is known to...

Victims of VA data theft offered free credit services

June 21, 2006 Veterans Affairs Department Secretary James Nicholson on Wednesday announced plans to provide free credit monitoring for millions of veterans and active-duty military personnel whose data was stolen. Nicholson said police have no further leads on what became of a laptop that contained personal information on 26.5 million people that was...

Expert shares ideas for protecting government data

June 20, 2006 A former White House cyber-security adviser to President Bush and former President Clinton on Tuesday offered a prescription to federal agencies and companies searching for ways to prevent security breaches. Richard Clarke said during a speech to government officials and companies that the security breaches at the Energy and Veterans...

Another federal breach exposes employee records

June 9, 2006 The Energy Department disclosed to Congress on Friday that it suffered a security breach from a hacker in September that compromised 1,500 personnel records. The news broke just as a House Energy and Commerce Oversight and Investigations Subcommittee was supposed to start a hearing on how secure Energy Department computers...

Panel to examine VA computer security practices

May 31, 2006 The committee that gave the Veterans Administration an "F" for its computer security practices plans a hearing June 8 to ask for an update on the department's reforms. House Government Reform Committee Staff Director Dave Marin said the focus of the hearing will be whether tighter laws are needed to...

CIA nominee's hearing may focus on wiretapping

May 8, 2006 The Senate confirmation hearing for Air Force Gen. Michael Hayden to head the CIA may turn into an investigation of a wiretapping program by the National Security Agency. At least that is the hope of some privacy rights groups. "It's an excellent opportunity for Congress to ask some tough questions...

Homeland Security agency to focus on information-sharing plans

February 2, 2006 The homeland security agency tasked with protecting critical infrastructures sees 2006 as a year to improve information-sharing among key sectors like electricity, water and information technology. The Homeland Security Department is expected to send the national infrastructure protection plan to the White House this month, according to Col. Robert Stephan,...

OMB: Agency information sharing key in Internet's technical upgrade

December 8, 2005 Federal agencies should actively share information as they transition to the technical parts of the next-generation Internet in time for the June 2007 deadline set by the Office of Management and Budget, according to a report released Thursday. The study, which was released during the annual IPv6 Summit in Reston,...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.