AUTHOR ARCHIVES

Results 541-550 of 614

New federal CTO lays out his strategy

January 18, 2002 The federal government's new chief technology officer laid out his plans for defining and putting in place a technology architecture for agencies in a telephone interview with journalists Friday. Norman Lorentz, the former CTO of Dice Inc., said he would focus his attention on two areas. First, he'll help agency...

OMB hires first governmentwide chief technology officer

January 14, 2002 The Bush administration has hired the first governmentwide chief technology officer, according to a spokeswoman with the Office of Management and Budget. Norman Lorentz, the former CTO of information technology industry job service Dice Inc., started working at OMB Jan.2, reporting to Mark Forman, associate director for information technology and...

What Companies Want to Protect

January 1, 2002 Home computer tips; charts that pack a punch; bygone beepers. ome computer users are especially vulnerable to viruses, worms and hackers. Such malicious activity can disable your computer and destroy irreplaceable data. Without protection, hackers can take control of your system. Worse, they can use your system to attack others....

Precious Secrets

January 1, 2002 Government contractors tighten their grip on trade secrets. n February 1997, B.E. Meyers & Co., a Washington state manufacturer of night vision equipment used by the Navy Seals, filed suit against the government. The company charged that during competition for a contract for infrared weapons sights, the Navy gave secret...

Bureaucratic Battles Bog Down Biometrics

January 1, 2002 Biometrics may be the wave of the future, but it's off to a slow start. atching Tom Cruise slowly descend by his ankles into a secure area at CIA headquarters could take anyone's breath away. But true technophiles appreciate the bits of Hollywood spectacle in the 1996 movie Mission: Impossible...

A Closer Look At Your Luggage

January 1, 2002 he Aviation and Transportation Security Act requires that all luggage checked at U.S. airports be screened by explosive-detection systems by the end of 2002. However, since only two companies make the machines airports need-InVision Technologies of Newark, Calif., and L-3 Communications of New York City-meeting that deadline will be a...

Judge lets some Interior employees back online

December 18, 2001 After enduring an Internet and e-mail blackout for nearly two weeks, some Interior Department employees could regain access to the cyber world under an order issued Tuesday by a U.S. District Court judge in Washington. On Dec. 5., the court ordered Interior to disconnect nearly all of its computers from...

Treasury task force wages financial warfare against terrorists

December 18, 2001 Since Sept. 11, investigators with a special Treasury Department task force have quickly learned how to uncover the web of bank accounts, electronic funds transfers and covert money laundering operations that fund terrorist cells. In the effort to root out al-Qaida and its ilk, the Customs Service is leading an...

Court-ordered blackout leaves Interior employees without Internet, e-mail

December 14, 2001 Interior Department employees have been working without Internet or external e-mail access for more than a week, after a U.S. District Court ordered the agency to take its computers offline. On Dec. 5, Judge Royce C. Lamberth told the department to disconnect from the Internet all "information technology systems" that...

Info tech outsourcing to double in five years, study says

December 10, 2001 As the government faces an impending shortfall of skilled technology workers, the federal technology outsourcing market will grow more than twofold over the next five years, according to a report issued Monday by IT analysis and marketing firm INPUT in Chantilly, Va. By 2006, agencies will spend $13.2 billion on...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.