AUTHOR ARCHIVES

Results 11-20 of 180

Hackers May Have Manipulated Athlete Data, Can Remotely Administer Insulin and Defaced Buzzfeed

October 11, 2016 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: WADA Questions Data in Latest Medical Records Dump The Fancy Bear hacking collective released more confidential medical information on Olympic athletes, but this time the World Anti-Doping Agency questions the data's validity. WADA...

Hackers Target Citizen Journalists; Share Michelle Obama's Passport and Corrupt Presidential Debate Polls

October 3, 2016 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Russia-Linked Fancy Bear Targets Citizen Journalists Two hacking collectives with suspected ties to the Russian government have sustained attacks on a citizen journalism site since 2015, security experts say. Security vendor TheatConnect released...

Nextgov ebook: Beyond the Beltway: The Government Expands Its Hunt For New Tech

September 27, 2016 FROM NEXTGOV arrow Over the past several months, Nextgov’s Tech + Tequila meetups have been gathering a loyal following—government and private-sector techies looking for a place to unwind over cocktails and discuss the most cutting-edge federal projects. Our early fall meetup centered on a broad federal effort to tap into commercial tech hubs...

Quiz: Are You The One Letting Hackers into Your Agency?

September 26, 2016 FROM NEXTGOV arrow Agencies face different kinds of insider threats: malicious actors, coerced colleagues, and well-meaning but unwitting employees who don’t realize their bad habits make agency networks vulnerable. Are you in that last category? It’s far easier to be a cyber liability than a cyber protector. After all, a simple flash drive...

Hackers Knock Security News Blog Offline, Steal 500M Yahoo Accounts and Use NSA Tools on Cisco Customers

September 26, 2016 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Hackers Knock Security News Blog Offline With Massive DDOS Attack Security news blog KrebsOnSecurity.com experienced what it called “an extremely large and unusual” distributed denial-of-service attack that eventually took the site down when...

Hackers Leak More DNC Data and Medical Records; Air Bag Software Bug Leads to 4.3M Vehicle Recall

September 19, 2016 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Guccifer 2.0 Releases New Batch of DNC Files The hacker who claimed responsibility for stealing and making public Democratic National Committee emails in the summer released a new batch of committee documents Tuesday....

Quiz: How Likely Are You to Fall Victim to a Data Breach?

September 15, 2016 FROM NEXTGOV arrow Hackers targeting federal agencies are a serious threat to keeping the government's information safe, but careless mistakes by employees can be just as dangerous. The insider threat is a growing challenge and agencies are working to constantly train their workers on best practices both online and offline when it comes...

Hackers Steal Russian Instant Messenger Information, Target Pokemon Go Players and Crib Porn Site Account Details

September 12, 2016 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Another Mega-Breach: 33M Russian Instant Messenger Accounts Stolen It’s becoming ordinary to hear that millions of some website’s accounts have been stolen. The latest victim is QIP, a Russian instant messenger service, which...

Hackers Steal Dropbox Credentials, Infect IoT Devices and Exploit Apple OS

September 6, 2016 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Apple Releases OS Fix to Block Spyware The same zero days that allowed sophisticated spyware to take over iPhones also existed in Apple OS X and the Safari web browser. Citizen Lab and...

Hackers Exploit iOS Zero Days, Take Over Ukraine Government's Social Media, and Target News Outlets

August 29, 2016 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Spyware Exploits 3 Zero Days in Apple’s iOS Text messages sent to a human rights activist led to an Apple software update to plug three zero-day vulnerabilities in iOS devices. Ahmed Mansoor, an...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.