AUTHOR ARCHIVES

Results 41-50 of 58

Romney accidentally sympathizes with Obama on fiscal crisis

July 24, 2012 Mitt Romney inadvertently blurted out an Obama campaign talking point last night while discussing the impending "fiscal cliff" facing Congress. In an interview on CNBC's The Kudlow Report, Romney said that whoever wins the election this fall shouldn't be unfairly blamed for the coming fiscal crisis prompted by the expiration...

It's time to start stoking fears of cyberwar

July 24, 2012 FROM NEXTGOV arrow This week is Washington's "make-or-break" moment to pass a new cybersecurity bill ahead of the August recess. As a result, there's never been a better time to stoke fears of a crippling cyber attack regardless of its actual likelihood. As The Hill's Jennifer Martinez and Brendan Sasso report today, Senate...

How many people phone companies hire to give away your information

July 9, 2012 FROM NEXTGOV arrow Thanks to a report in today's New York Times, we know cell phone companies are increasingly besieged with requests for phone records from the U.S. government. But who's answering all those requests? It turns out, Verizon Wireless, AT&T, Sprint and others hire a veritable army of employees to deliver its...

The right has found their leaker

June 18, 2012 The Justice Department investigation into who leaked national security secrets hasn't even started yet and most experts say it will drag on for months but a rising chorus of conservatives think they've got their man: national security adviser Tom Donilon. It's a charge based on pure speculation, but you wouldn't...

Everyone has something to lose in D.C.'s leak fever

June 13, 2012 Washington is united in outrage over a series of U.S. national security leaks, and it's far from certain who will get burned, but the crackdowns could backfire on the Obama administration, Republicans, Congressional members, and the press. Bending to criticisms that the White House leaked counter-terrorism stories to make President...

There's a hex on Obama's Commerce secretaries

June 11, 2012 It's supposed to be a forgettable cabinet position, but the people nominated to lead President Obama's Department of Commerce seem predestined to resist the low profile. Last night, Commerce Secretary John Bryson became the latest example of bad luck befalling the Obama administration's Department of Commerce after being cited for...

White House, lawmakers differ in views of recent leaks

June 8, 2012 Democratic Senator Dianne Feinstein's reputation for toughness when it comes to cracking down on national security leaks is bringing her dangerously close to butting heads with the White House. As Reuters' Mark Hosenball and Susan Cornwell report, the Senate Intelligence Committee chairwoman is considering joining Republican calls for an outside...

Here's how the Stuxnet virus could be used against the U.S.

June 4, 2012 FROM NEXTGOV arrow The cat is out of the bag: The United States is the first known country to carry out a sustained cyber attack with the intent of destroying another country's infrastructure. Earlier today, The New York Times' David Sanger confirmed America's role in developing Stuxnet, the computer worm deployed against Iran's...

The federal worker who most deserves a bonus

May 18, 2012 A federal agent at the National Geospatial-Intelligence Agency involved in capturing Osama bin Laden received a bonus equivalent to one-third of his normal annual salary, reports Russ Ptacek of Washington's 9 News Now. The disclosure, which appears to be a result of nice investigative work by the local Washington news...

Homeland Security communicated with local officials about Occupy

May 16, 2012 If Occupy Wall Street activists were worried about the Department of Homeland Security monitoring their activities, wait until they get a load of this. According to new DHS documents obtained from a Freedom of Information Act request by the Partnership for Civil Justice Fund (PCJF), DHS officials were also communicating...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.