AUTHOR ARCHIVES

Jill R. Aitoro

Results 1-10 of 782

Agencies turn to technology for help reducing payment errors

November 22, 2010 FROM NEXTGOV arrow In the past few years, 14,000 felons, both fugitive and jailed, raked in $230 million in federal benefits they were not entitled to receive. Twenty thousand dead Americans earned $180 million. In 2009 alone, the federal government made $110 billion in improper payments--that's nearly double the amount taxpayers will end...

Flagging Fraud

November 1, 2010 Billions of dollars are lost each year to payment errors and bogus benefit claims, and agencies are turning to technology for help. In the past few years, 14,000 felons, both fugitive and jailed, raked in $230 million in federal benefits they were not entitled to receive. Twenty thousand dead Americans...

Effective technology in government depends on executive buy-in, leaders say

October 14, 2010 FROM NEXTGOV arrow At its core, enterprise architecture is less about computer applications and more about management. That's why Randy Hite, director of information technology architecture and systems at the Government Accountability Office, says assigning the responsibility to the IT shop is the tail trying to wag the dog. "Enterprise architecture has to...

Progress is slow on cybersecurity goals, GAO reports

October 7, 2010 FROM NEXTGOV arrow The White House's failure to assign agencies cybersecurity roles and responsibilities has slowed efforts to implement President Obama's plan for protecting computer networks, according to a new report from the Government Accountability Office. Of 24 recommendations in the president's May 2009 cyber policy review, only two have been fully implemented,...

From Nextgov.com: Progress is slow on cybersecurity goals, GAO reports

October 7, 2010 The White House's failure to assign agencies cybersecurity roles and responsibilities has slowed efforts to implement President Obama's plan for protecting computer networks, according to a new report from the Government Accountability Office. Read the full story on Nextgov.com.

More than half of major corporations report politically motivated cyberattacks

October 6, 2010 FROM NEXTGOV arrow More than half of the companies worldwide that support critical services such as banks and energy believed they were victims of cyberattacks inspired by political motives, according to a survey a major security software vendor released on Wednesday. Symantec reported 53 percent of the 1,580 companies it surveyed, including those...

Supreme Court hears arguments in NASA privacy case

October 5, 2010 FROM NEXTGOV arrow The U.S. Supreme Court heard oral arguments on Tuesday morning to determine whether NASA's implementation of a 2004 presidential directive violates contractors' privacy rights by requiring them to submit to extensive background checks for federal identification badges. The high court will review a 2008 9th Circuit Court of Appeals injunction...

From Nextgov.com: Supreme Court hears arguments in NASA privacy case

October 5, 2010 The U.S. Supreme Court heard oral arguments on Tuesday morning to determine whether NASA's implementation of a 2004 presidential directive violates contractors' privacy rights by requiring them to submit to extensive background checks for federal identification badges. Read the full story on Nextgov.com.

Technology by Design

October 1, 2010 Enterprise architecture shifts IT strategy from the computer room to the boardroom. At its core, enterprise architecture is less about computer applications and more about management. That's why Randy Hite, director of information technology architecture and systems at the Government Accountability Office, says assigning the responsibility to the IT shop...

Results of cyber drill will help shape final version of response plan

September 29, 2010 FROM NEXTGOV arrow Lessons learned this week from the Homeland Security Department's third large-scale cybersecurity drill will help refine the National Cyber Incident Response Plan, which will be finalized for release later this year. Cyber Storm III kicked off on Tuesday to test the plan, which the Obama administration developed to guide agencies...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.