AUTHOR ARCHIVES

Results 1-10 of 201

Podcast: How the Government is Putting Artificial Intelligence to Work

February 23, 2017 FROM NEXTGOV arrow In the private sector, artificial intelligence has grown leaps and bounds, finding roles in the self-driving cars hitting the roads and Google's AlphaGo system. But how is government using AI technology? Nextgov's Executive Editor Camille Tuutti sat down to discuss advances in AI with the "What's Working in Washington" podcast....

Hackers Target Journalists, Tribal Members and Use Forged Cookies

February 21, 2017 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: State-Sponsored Hackers Target Journalists, Google Warns “Warning: Google may have detected government-backed attackers trying to steal your password,” reads a red banner greeting some journalists as they log into Gmail. Google has used...

Hackers Embarrass David Beckham, Breach Arby's and Knock Offline Dark Web Sites

February 13, 2017 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: David Beckham Emails Released on Soccer Version of WikiLeaks Global soccer star David Beckham joins the growing club of other high-profile people who have had personal emails published online. Hackers stole emails and...

Lawmakers Show Love to Blockchain, 'Star Wars,' But Question FBI FOIA Changes

February 10, 2017 FROM NEXTGOV arrow The technology behind bitcoin has new crusaders in Congress. Reps. Jared Polis, D-Colo., and David Schweikert, R-Ariz., Feb. 9 officially introduced the Congressional Blockchain Caucus to brief other members about blockchain technology and digital currencies, and creating public policy for them. Considered secure by design, a blockchain is distributed database...

Homeland Security to Unveil 12 New Tools at Cyber Conference

February 10, 2017 FROM NEXTGOV arrow The Homeland Security Department’s science and technology division will be showing off a dozen new cyber tools developed with DHS funds at next week's RSA cybersecurity conference in San Francisco. The tools range from helping organizations join forces against malware attacks to offering secure connections to Bluetooth devices. The division...

Lawmakers Want to Drain the Swamp of Feds and Beef Up Cybersecurity

February 6, 2017 FROM NEXTGOV arrow Confirmations clogged up Congress, but lawmakers still had time to introduce a flurry of bills focused on federal employees and unveil to-do lists zeroing in on IT modernization and security. Speaking of All the President’s Men Transportation Secretary Elaine Chao and State’s Rex Tillerson were sworn in. President Donald Trump’s...

Hackers Hold Info Ransom, Steal Diplomatic Emails and Infect CCTV System

February 3, 2017 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Ransomware Causes Dallas Police to Lose 8 Years of Evidence A police station in Dallas lost digital evidence, such as videos and photos, when it cleaned up from a ransomware attack after deciding...

Hackers Discover Code to Reboot Samsung Phones Forever, Claim Trump's Twitter Account Has Bad Security, and Block Online Banking

January 30, 2017 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: A Single Message Can Make Some Samsung Galaxy Phones Reboot Forever Older Samsung devices are vulnerable to a remote attack that makes the devices reboot over and over, according to security researchers. Context...

Video: Understanding Obama's Cyber Legacy

January 27, 2017 FROM NEXTGOV arrow When it comes to cybersecurity and the government, the last eight years had a lot of good... and bad. The Obama administration spent a lot of time building up and strengthening cyber policy and working with the private sector, but it didn't always pay off, according to Nextgov's own Joseph...

Cyber Breach at Hospital; McDonald's User Info Exposed; and a Gmail Scam

January 23, 2017 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Hospital Breach Affects Thousands of Patients A "cybersecurity breach" at a third-party vendor may have compromised the information of thousands of patients at a Virginia hospital. Over 5,450 vascular and/or thoracic patients seen...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.