Results 71-80 of 281

Buyer beware: Mobile payments might not be protected

June 29, 2012 FROM NEXTGOV arrow Some current financial rules may not be fully up to the task of regulating the growing number of mobile payment systems, government officials told a House subcomittee on Friday. Stephanie Martin, associate general counsel for the Federal Reserve Board of Governors, warned members of the House Financial Services Subcommittee on...

Health IT's small, but significant role in health reform

June 28, 2012 FROM NEXTGOV arrow Proponents of government health IT programs may be breathing a little easier after the U.S. Supreme Court upheld almost all of President Obama's landmark healthcare reform law. Most efforts to give hospitals and doctors the latest IT tools are rooted in 2009 stimulus laws that predate Obama's Affordable Care Act,...

Bill would close ‘floodgates’ to counterfeit microchips

June 22, 2012 FROM NEXTGOV arrow A flawed Department of Homeland Security policy has opened the "floodgates" to counterfeit microchips from other countries, Rep. Mike McCaul, R-Texas, said on Thursday as he announced a bill designed to stem the tide. "This is a tremendous national security risk to our military and our intelligence networks," McCaul, who...

Committee votes to prevent U.N. Internet regulation

June 20, 2012 FROM NEXTGOV arrow As expected, the House Energy and Commerce Committee on Wednesday unanimously approved a resolution aimed at preventing any efforts to hand the United Nations more power to oversee the Internet. Rep. Mary Bono Mack, R-Calif., championed the resolution, which was sparked by concerns that some countries may try to use...

House intel chair: Cyber bill may lack mandatory standards

June 18, 2012 FROM NEXTGOV arrow The White House and Senate Democrats may be forced to settle for cybersecurity legislation that doesn’t include mandatory standards for critical computer networks, House Intelligence Committee Chairman Mike Rogers, R-Mich., said on Monday. Rogers successfully shepherded a controversial cybersecurity information-sharing bill through the House in April, but White House officials...

Report: Tech companies must stand up against repressive regimes

June 15, 2012 FROM NEXTGOV arrow Companies that want to operate in countries with repressive regimes need to minimize the way their technologies can be abused by the government, according to a new report commissioned by an Internet-freedom coalition. Technology companies have often faced dilemmas in countries like China, where government can abuse the same technology...

Lieberman: Cybersecurity bill could wilt over summer

June 13, 2012 FROM NEXTGOV arrow “Legislative pessimism” is threatening to sink comprehensive cybersecurity legislation even as Senate leaders vow action, Senate Homeland Security Committee Chairman Joe Lieberman, I-Conn., said on Tuesday. There was talk that the Cybersecurity Act of 2012, which Lieberman cosponsored with other Homeland Security panel members and leaders of the Intelligence and...

State sees progress against international Internet regulation plans

May 31, 2012 FROM NEXTGOV arrow American diplomats are making progress in heading off possible international proposals to increase Internet regulation by the United Nations, a top State Department official told a House subcommittee on Thursday. A range of American lawmakers, businesses, and nonprofit organizations fear that some countries will try to use negotiations over international...

Cybersecurity bill signing still being delayed

May 30, 2012 FROM NEXTGOV arrow After years of work, backers of the sweeping Cybersecurity Act of 2012 say they’re eager for Senate debate on the bill, but divisions over privacy and regulation show little sign of abating. This was supposed to be the bill that got everyone on board. But its sponsors are back at...

New partnership aims to combat zombie computer networks

May 30, 2012 FROM NEXTGOV arrow Government officials and communications companies announced a partnership on Wednesday to crack down on hackers who harness hundreds to computers to steal information, send spam, or launch cyberattacks. The campaign is aimed at "botnets," which are created when hackers surreptitiously use a network of other people's computers. Computer owners rarely...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.