AUTHOR ARCHIVES

Kaveh Waddell

Kaveh Waddell Kaveh Waddell is an associate editor at The Atlantic.
Results 1-10 of 336

Why Some Apps Use Fake Progress Bars

February 21, 2017 FROM NEXTGOV arrow In a fit of productivity, I did my taxes early this year. They were a bit more complex than usual, so I set aside some time to click through TurboTax and make sure I got everything right. Throughout the process, the online tax-preparation program repeatedly reassured me it had helped...

The Risks of Sending Secret Messages in the White House

February 15, 2017 FROM NEXTGOV arrow By some accounts, the deluge of leaks detailing the hurdles and setbacks that have troubled the first weeks of the Trump administration have provoked panic among its highest ranks—and prompted top officials to try to identify the leaky staffers. President Trump has tweeted his dismay at the leaks several times,...

A NASA Engineer Was Required to Unlock his Phone at the Border

February 13, 2017 FROM NEXTGOV arrow Everything started to go wrong just after 5 a.m., when Sidd Bikkannavar scanned his passport, placed his hand on a fingerprint reader, and watched as the automated customs kiosk spat out a receipt with a black X drawn across it. It was January 31. Bikkannavar had just arrived at Houston’s...

A NASA Engineer Was Required to Unlock his Phone at the Border

February 13, 2017 Everything started to go wrong just after 5 a.m., when Sidd Bikkannavar scanned his passport, placed his hand on a fingerprint reader, and watched as the automated customs kiosk spat out a receipt with a black X drawn across it. It was January 31. Bikkannavar had just arrived at Houston’s...

'Give Us Your Passwords'

February 10, 2017 FROM NEXTGOV arrow “What sites do you visit? And give us your passwords.” That’s what U.S. Homeland Security Secretary John Kelly wants foreign visitors to hear before they’re allowed to enter the United States. “If they don’t want to give us that information, then they don’t come,” he said, while testifying in front...

What Happens if Border Agents Are Allowed to Demand Access to Your Phone and Online Accounts?

February 10, 2017 “What sites do you visit? And give us your passwords.” That’s what U.S. Homeland Security Secretary John Kelly wants foreign visitors to hear before they’re allowed to enter the United States. “If they don’t want to give us that information, then they don’t come,” he said, while testifying in front...

Mapping Countries That Censor the Internet

February 9, 2017 FROM NEXTGOV arrow If you’re having trouble with your internet connection, one of the first things tech support will ask you to do is to run a speed test. There are dozens of websites and apps that will, at the tap of a button, measure your network speed—but they can’t tell you which...

What Happened to Trump’s Secret Hacking Intel?

February 7, 2017 Hours before the new year, Donald Trump—then still the president-elect—was speaking to a few reporters outside Mar-a-Lago, his private club in Palm Beach, Florida. He was telling them about his doubts that the intelligence community would perform an accurate investigation into the cyberattacks that targeted Democrats in the months leading...

Your Browsing History Alone Can Give Away Your Identity

February 6, 2017 FROM NEXTGOV arrow Advertisers would give just about anything to be able to lurk over your shoulder as you browse the internet. They want to know what sites you visit, how you get to them, how long you spend on them, and where you go next—along with as much personal information about you...

How Did Cybersecurity Become So Political?

February 2, 2017 FROM NEXTGOV arrow Less than a month before he was elected president, Donald Trump promised to make cybersecurity “an immediate and top priority for my administration.” He had talked about technology often on the campaign trail—mostly to attack Hillary Clinton for using a private email server when she was secretary of state. But...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.