AUTHOR ARCHIVES

Results 31-40 of 281

DHS chief says she doesn't use e-mail

September 28, 2012 FROM NEXTGOV arrow Homeland Security Secretary Janet Napolitano, who is a key player in national cybersecurity efforts, said on Friday she doesn't use e-mail. "Don't laugh, but I just don't use e-mail at all," she said during a discussion at a Cybersecurity Summit hosted by National Journal and Government Executive. She didn't explain...

American industry groups dissect EU cloud computing report

September 28, 2012 FROM NEXTGOV arrow American industry groups are welcoming a new European Union strategy for streamlining cloud computing networks, but not everyone likes the specifics. The EU document, "Unleashing the Potential of Cloud Computing in Europe," is designed to help harmonize policies for cloud computing networks, which store information on remote servers accessed over...

Senators: FDA should protect medical implants from hackers

September 27, 2012 FROM NEXTGOV arrow Citing a new government watchdog report, three House Democrats want the Food and Drug Administration to better protect implantable medical devices from hackers. "Wireless medical devices are susceptible to increasingly advanced hacking techniques that could threaten patient health," said Rep. Ed Markey, D-Mass., in a statement. "Patients need to be...

Cybersecurity order 'close to completion'

September 20, 2012 FROM NEXTGOV arrow A White House executive order on cybersecurity is “close to completion,” but Congress will still need to act to ensure security for American networks, Homeland Security Secretary Janet Napolitano said on Wednesday. The draft order is being reviewed at the "highest levels" and some issues still need to be ironed...

Senate panel approves Internet freedom resolution

September 20, 2012 FROM NEXTGOV arrow The Senate Foreign Relations Committee on Wednesday unanimously approved a resolution calling on the United States to prevent the United Nations from having a greater role in governing the Internet. The nonbinding resolution, which mirrors one passed by the House in August, instructs Secretary of State Hillary Clinton to pursue...

Undercover police used smartphones to keep tabs on protests in Tampa

September 18, 2012 FROM NEXTGOV arrow A network that allowed undercover police to use smartphones and tablets to monitor and communicate during protests at the Republican National Convention is giving new meaning to having “eyes on the ground.” Police have long maintained an undercover presence at major gatherings, including political protests — not to monitor free...

GOP Senators assail White House for pushing executive order on cybersecurity

September 14, 2012 FROM NEXTGOV arrow Top Republican critics of a White House-backed Senate cybersecurity bill on Thursday criticized the White House’s threat to issue an executive order on the issue. Sens. John McCain, R-Ariz., Kay Bailey Hutchison, R-Texas, and Saxby Chambliss, R-Ga., penned a Wall Street Journal op-ed decrying White House plans to “tighten the...

Senate unlikely to revisit cybersecurity bill before election, Lieberman says

September 12, 2012 FROM NEXTGOV arrow Senate Homeland Security Chairman Joe Lieberman, I-Conn., told National Journal on Tuesday there is little chance the Senate will revisit his proposed cybersecurity legislation until after the November election. Lieberman, a lead sponsor of the Cybersecurity Act of 2012, also said he supports a review by the White House of...

Commission leaders call for emergency communications network

September 11, 2012 FROM NEXTGOV arrow The former heads of the commission that investigated the terror attacks of Sept. 11, 2001, pointed on Tuesday to unfinished plans for a nationwide emergency communications system. The attacks revealed the problems posed by a patchwork of emergency radio networks and devices that often do not work with each other....

9/11 haunts debate over cybersecurity

September 11, 2012 FROM NEXTGOV arrow More than a decade after the Sept. 11, 2001, terrorist attacks, the tragedy haunts Washington policymakers who are deadlocked over how to protect the country against cyberattacks. Current and former government officials have spent months pointing to 9/11 as a harbinger of what could occur if Congress, federal agencies, and...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    View
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    View
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    View
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    View
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    View
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    View
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    View

When you download a report, your information may be shared with the underwriters of that document.