AUTHOR ARCHIVES

Kaveh Waddell

Kaveh Waddell Kaveh Waddell is an associate editor at The Atlantic.
Results 1-10 of 324

Why Elections Are Now Classified as 'Critical Infrastructure'

January 13, 2017 Last Friday, the same day three of the top spy agencies in the U.S. released a summary of an investigation into Russia’s role in cyberattacks before the election, the Department of Homeland Security made a move that attracted less attention: It classified the elections process as “critical infrastructure,” putting it...

Why Is Obama Expanding Surveillance Powers Right Before He Leaves Office?

January 13, 2017 On Thursday, the Obama administration finalized new rules that allow the National Security Agency to share information it gleans from its vast international surveillance apparatus with the 16 other agencies that make up the U.S. intelligence community. With the new changes, which were long in the works, those agencies can...

Why Is Obama Expanding Surveillance Powers Right Before He Leaves Office?

January 13, 2017 On Thursday, the Obama administration finalized new rules that allow the National Security Agency to share information it gleans from its vast international surveillance apparatus with the 16 other agencies that make up the U.S. intelligence community. With the new changes, which were long in the works, those agencies can...

Why Is Obama Expanding Surveillance Powers Right Before He Leaves Office?

January 13, 2017 FROM NEXTGOV arrow On Thursday, the Obama administration finalized new rules that allow the National Security Agency to share information it gleans from its vast international surveillance apparatus with the 16 other agencies that make up the U.S. intelligence community. With the new changes, which were long in the works, those agencies can...

Trump’s Cyber-Appeasement Policy Might Encourage More Hacks

January 12, 2017 Since well before he was elected president, Donald Trump has been casting doubt on the accuracy and integrity of investigations that assign blame for cyberattacks. His statements have created an atmosphere of mistrust around forensic analyses, like the one focused on Russia that three top spy agencies briefed him on...

Trump’s Cyber-Appeasement Policy Might Encourage More Hacks

January 10, 2017 FROM NEXTGOV arrow Since well before he was elected president, Donald Trump has been casting doubt on the accuracy and integrity of investigations that assign blame for cyberattacks. His statements have created an atmosphere of mistrust around forensic analyses, like the one focused on Russia three top spy agencies briefed him on last...

This is the Hacking Investigation Trump Wants Instead

January 9, 2017 FROM NEXTGOV arrow President-elect Donald Trump wants to get to the bottom of news reports that revealed intelligence agencies had intercepted chatter among Russian government officials celebrating Trump’s election. But although he was scheduled to get briefed on the matter on Friday, he doesn’t seem very interested in the intelligence itself. Instead, he...

Why Bosses Can Track Their Employees 24/7

January 6, 2017 FROM NEXTGOV arrow Suppose you’re being followed. Someone’s tracking your phone, or has placed a GPS device on your car. They know if you’re at home, or a pregnancy clinic, or church, or a gay bar. Depending on who’s tracking you, this could be a violation of your fundamental constitutional rights—or it could...

Don't Read Too Much Into Vermont Hack Debacle

January 3, 2017 FROM NEXTGOV arrow On Friday evening, The Washington Post reported hackers affiliated with the Russian government had penetrated the United States electric grid by attacking a utility company in Vermont. The story was originally illustrated with an image of the headquarters of a Russian spy agency, which it alleged was behind the intrusion....

How Much Do Businesses Pay for Stolen Data?

December 22, 2016 FROM NEXTGOV arrow One day early this year, employees at a hospital in Hollywood found their computers completely unusable. The hospital’s system had been taken over by malware, forcing doctors and nurses to resort to pen and paper to register new patients and keep records. The cyberattack came with a digital ransom note:...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.