Rebecca Greenfield

Results 11-20 of 178

There Are at Least Three Easy Ways to Hack the Emergency Alert System

July 10, 2013 FROM NEXTGOV arrow The small-scale hacking of the Emergency Alert System in Montana to broadcast a supposed zombie apocalypse earlier this year, revealed the possible safety hazards of a vulnerable alert system, making this new report on various ways to hack the system all the more alarming.According to an IOActive Security Advisory published,...

The Government Is Snooping Through Your Snail Mail

July 5, 2013 In addition to the email and phone metadata the U.S. government is tracking, the feds also have an eye on your regular old snail mail, which is actually a "treasure trove of information," according to a former FBI agent who used to work with the Mail Isolation Control and Tracking...

What Your Email Metadata Told the NSA About You

June 28, 2013 FROM NEXTGOV arrow President Obama said "nobody is listening to your telephone calls," even though the National Security Agency could actually track you from cellphone metadata. Well, the latest from the Edward Snowden leaks shows that Obama eventually told the NSA to stop collecting your email communications in 2011, apparently because the so-called...

The Myth of the Cool Office

June 25, 2013 Don't be fooled by the perks at all those Silicon Valley (and Alley) offices — it's all just part of a subtle plot to control employee behavior. The founders of, which just got itself a $1 billion valuation, admitted as much to Bloomberg's Sarah Freier. The shopping site wields...

Facebook's Former Security Chief Now Works for the NSA

June 21, 2013 FROM NEXTGOV arrow About a year after Facebook reportedly joined PRISM, Max Kelly, the social network's chief security officer left for a job at the National Security Agency, either a curious career move or one that makes complete sense. The Chief Security Officer at a tech company is primarily concerned with keeping its...

Which Tech Company Does the NSA Use Most?

June 19, 2013 FROM NEXTGOV arrow Of the nine companies supposedly working with the government on PRISM, six and a half —Yahoo, Facebook, Microsoft (which may or may not include Skype), Apple, and Google/YouTube(sort of) — have disclosed the number of government requests they get including the secret FISA court ones, giving us an idea of...

Should We Blame Social Media for Graffiti in National Parks?

June 6, 2013 FROM NEXTGOV arrow It's always disturbing to see vandalism in our national parks, but it's not so clear, as this New York Times story suggests, that social media is exacerbating the problem. The report quotes park personnel who blame the Internet for encouraging vandals. "With social media people take pictures of what they’ve...

Linked In Jumps on the 2-Step Password Train Because It Looks Good

June 3, 2013 FROM NEXTGOV arrow A little less than a year after six million passwords got hacked from the site, LinkedIn has added the more secure two-step verification, probably to look just as responsible as all the other tech sites adding a step these days. LinkedIn hasn't had a breach since the high-profile hack last...

All Your Worst Fears About Google Glass Are Coming True

May 30, 2013 FROM NEXTGOV arrow It only took about six weeks for developers to take all of the theoretically creepy things the Internet dreamt up about the face computer of the future and turn those into real-life Google Glass nightmares. In addition to that creepy walking-and-stalking app Wink, Glassholes can look forward to a porn...

Five Steps to Avoid Getting Hacked

May 28, 2013 FROM NEXTGOV arrow It took three hackers less than a day to decipher the majority of a list of 16,000 encrypted passwords, all because of the laughably easy-to-crack passwords most of us pick to protect our online lives. The most successful guy got 90 percent of the "plains," as hackers call deciphered passwords...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.


When you download a report, your information may be shared with the underwriters of that document.