AUTHOR ARCHIVES

Results 71-80 of 281

Buyer beware: Mobile payments might not be protected

June 29, 2012 FROM NEXTGOV arrow Some current financial rules may not be fully up to the task of regulating the growing number of mobile payment systems, government officials told a House subcomittee on Friday. Stephanie Martin, associate general counsel for the Federal Reserve Board of Governors, warned members of the House Financial Services Subcommittee on...

Health IT's small, but significant role in health reform

June 28, 2012 FROM NEXTGOV arrow Proponents of government health IT programs may be breathing a little easier after the U.S. Supreme Court upheld almost all of President Obama's landmark healthcare reform law. Most efforts to give hospitals and doctors the latest IT tools are rooted in 2009 stimulus laws that predate Obama's Affordable Care Act,...

Bill would close ‘floodgates’ to counterfeit microchips

June 22, 2012 FROM NEXTGOV arrow A flawed Department of Homeland Security policy has opened the "floodgates" to counterfeit microchips from other countries, Rep. Mike McCaul, R-Texas, said on Thursday as he announced a bill designed to stem the tide. "This is a tremendous national security risk to our military and our intelligence networks," McCaul, who...

Committee votes to prevent U.N. Internet regulation

June 20, 2012 FROM NEXTGOV arrow As expected, the House Energy and Commerce Committee on Wednesday unanimously approved a resolution aimed at preventing any efforts to hand the United Nations more power to oversee the Internet. Rep. Mary Bono Mack, R-Calif., championed the resolution, which was sparked by concerns that some countries may try to use...

House intel chair: Cyber bill may lack mandatory standards

June 18, 2012 FROM NEXTGOV arrow The White House and Senate Democrats may be forced to settle for cybersecurity legislation that doesn’t include mandatory standards for critical computer networks, House Intelligence Committee Chairman Mike Rogers, R-Mich., said on Monday. Rogers successfully shepherded a controversial cybersecurity information-sharing bill through the House in April, but White House officials...

Report: Tech companies must stand up against repressive regimes

June 15, 2012 FROM NEXTGOV arrow Companies that want to operate in countries with repressive regimes need to minimize the way their technologies can be abused by the government, according to a new report commissioned by an Internet-freedom coalition. Technology companies have often faced dilemmas in countries like China, where government can abuse the same technology...

Lieberman: Cybersecurity bill could wilt over summer

June 13, 2012 FROM NEXTGOV arrow “Legislative pessimism” is threatening to sink comprehensive cybersecurity legislation even as Senate leaders vow action, Senate Homeland Security Committee Chairman Joe Lieberman, I-Conn., said on Tuesday. There was talk that the Cybersecurity Act of 2012, which Lieberman cosponsored with other Homeland Security panel members and leaders of the Intelligence and...

State sees progress against international Internet regulation plans

May 31, 2012 FROM NEXTGOV arrow American diplomats are making progress in heading off possible international proposals to increase Internet regulation by the United Nations, a top State Department official told a House subcommittee on Thursday. A range of American lawmakers, businesses, and nonprofit organizations fear that some countries will try to use negotiations over international...

Cybersecurity bill signing still being delayed

May 30, 2012 FROM NEXTGOV arrow After years of work, backers of the sweeping Cybersecurity Act of 2012 say they’re eager for Senate debate on the bill, but divisions over privacy and regulation show little sign of abating. This was supposed to be the bill that got everyone on board. But its sponsors are back at...

New partnership aims to combat zombie computer networks

May 30, 2012 FROM NEXTGOV arrow Government officials and communications companies announced a partnership on Wednesday to crack down on hackers who harness hundreds to computers to steal information, send spam, or launch cyberattacks. The campaign is aimed at "botnets," which are created when hackers surreptitiously use a network of other people's computers. Computer owners rarely...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download
  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care

    Download

When you download a report, your information may be shared with the underwriters of that document.