AUTHOR ARCHIVES

Jill R. Aitoro

Results 1-10 of 782

Agencies turn to technology for help reducing payment errors

November 22, 2010 FROM NEXTGOV arrow In the past few years, 14,000 felons, both fugitive and jailed, raked in $230 million in federal benefits they were not entitled to receive. Twenty thousand dead Americans earned $180 million. In 2009 alone, the federal government made $110 billion in improper payments--that's nearly double the amount taxpayers will end...

Flagging Fraud

November 1, 2010 Billions of dollars are lost each year to payment errors and bogus benefit claims, and agencies are turning to technology for help. In the past few years, 14,000 felons, both fugitive and jailed, raked in $230 million in federal benefits they were not entitled to receive. Twenty thousand dead Americans...

Effective technology in government depends on executive buy-in, leaders say

October 14, 2010 FROM NEXTGOV arrow At its core, enterprise architecture is less about computer applications and more about management. That's why Randy Hite, director of information technology architecture and systems at the Government Accountability Office, says assigning the responsibility to the IT shop is the tail trying to wag the dog. "Enterprise architecture has to...

Progress is slow on cybersecurity goals, GAO reports

October 7, 2010 FROM NEXTGOV arrow The White House's failure to assign agencies cybersecurity roles and responsibilities has slowed efforts to implement President Obama's plan for protecting computer networks, according to a new report from the Government Accountability Office. Of 24 recommendations in the president's May 2009 cyber policy review, only two have been fully implemented,...

From Nextgov.com: Progress is slow on cybersecurity goals, GAO reports

October 7, 2010 The White House's failure to assign agencies cybersecurity roles and responsibilities has slowed efforts to implement President Obama's plan for protecting computer networks, according to a new report from the Government Accountability Office. Read the full story on Nextgov.com.

More than half of major corporations report politically motivated cyberattacks

October 6, 2010 FROM NEXTGOV arrow More than half of the companies worldwide that support critical services such as banks and energy believed they were victims of cyberattacks inspired by political motives, according to a survey a major security software vendor released on Wednesday. Symantec reported 53 percent of the 1,580 companies it surveyed, including those...

Supreme Court hears arguments in NASA privacy case

October 5, 2010 FROM NEXTGOV arrow The U.S. Supreme Court heard oral arguments on Tuesday morning to determine whether NASA's implementation of a 2004 presidential directive violates contractors' privacy rights by requiring them to submit to extensive background checks for federal identification badges. The high court will review a 2008 9th Circuit Court of Appeals injunction...

From Nextgov.com: Supreme Court hears arguments in NASA privacy case

October 5, 2010 The U.S. Supreme Court heard oral arguments on Tuesday morning to determine whether NASA's implementation of a 2004 presidential directive violates contractors' privacy rights by requiring them to submit to extensive background checks for federal identification badges. Read the full story on Nextgov.com.

Technology by Design

October 1, 2010 Enterprise architecture shifts IT strategy from the computer room to the boardroom. At its core, enterprise architecture is less about computer applications and more about management. That's why Randy Hite, director of information technology architecture and systems at the Government Accountability Office, says assigning the responsibility to the IT shop...

Results of cyber drill will help shape final version of response plan

September 29, 2010 FROM NEXTGOV arrow Lessons learned this week from the Homeland Security Department's third large-scale cybersecurity drill will help refine the National Cyber Incident Response Plan, which will be finalized for release later this year. Cyber Storm III kicked off on Tuesday to test the plan, which the Obama administration developed to guide agencies...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.