AUTHOR ARCHIVES

William Matthews

Results 51-60 of 79

Private sector not adequately defending U.S. cyberspace, security expert warns

March 16, 2011 FROM NEXTGOV arrow For more than a decade, the United States has relied mainly on voluntary action by private companies to protect the nation's critical cyber infrastructure, but "it's not working," a cybersecurity expert told lawmakers. Companies own 85 percent of the critical infrastructure, and they have been unwilling to invest what is...

From Nextgov.com: Private sector not adequately defending U.S. cyberspace, security expert warns

March 16, 2011 For more than a decade, the United States has relied mainly on voluntary action by private companies to protect the nation's critical cyber infrastructure, but "it's not working," a cybersecurity expert told lawmakers. Read the whole story in Nextgov.com.

New FBI system to use hands, faces, irises, in addition to 70 million fingerprints to ID suspects

March 15, 2011 FROM NEXTGOV arrow If you get stopped by the police in Houston, it will take them just 16 seconds to compare your fingerprints to the 2 million that are in a database of terrorists, sex offenders, criminals with outstanding arrest warrants and others. The Repository for Individuals of Special Concern system is part...

Widespread errors hinder Obama administration's open government initiative

March 14, 2011 FROM NEXTGOV arrow There are two sides to the Obama administration's push for open government: On the positive side: A lot of new websites have sprung up offering anyone who's interested access to data on government spending, contracts, improper payments, nutrition, education, auto safety, air travel, air quality and hundreds of other subjects....

Federal IT dashboard not winning manager hearts

March 11, 2011 FROM NEXTGOV arrow In the eight months since its debut, the improved Federal IT Dashboard, which rates U.S. agency technology projects and posts the results on the Internet for the world to see, has not won the hearts of all IT project managers. Putting cost and performance data "on a public website was...

Analyst: Agencies could reap greater benefits from investments in developmental technologies

March 8, 2011 FROM NEXTGOV arrow When the U.S. military and the intelligence community need new technology, whether it's smart batteries or ultrasensitive chemical sensors, often no company produces it and none is willing to try because the limited market and risky research and development likely will make the venture unprofitable. To fill the gap in...

Feds to launch product safety website despite opposition

March 7, 2011 FROM NEXTGOV arrow On March 11, the Consumer Products Safety Commission plans to unveil a searchable website designed to warn the public about dangerous products despite an effort now under way in Congress to defund it, the agency said Friday. The database, which was mandated by the 2008 Consumer Product Safety Improvement Act,...

CIA blames 'technical difficulties' for website crash

March 4, 2011 FROM NEXTGOV arrow The CIA's website, which crashed Thursday afternoon, was revived shortly before 11 a.m. Friday morning. The spy agency declined to discuss what might have caused the blackout, but Office of Management and Budget officials referred all questions to civilian cybersecurity authorities at the Homeland Security Department, which suggests the event...

Survey: Agencies are failing to maintain critical electronic records

March 4, 2011 FROM NEXTGOV arrow After investigating itself for almost a year, the Justice Department reported to the National Archives and Records Administration that it is unable to determine whether any e-mails related to its notorious 2002 "torture memos" were improperly destroyed. The department's finding, which it delivered to NARA in February, appears to close...

From Nextgov.com: Agencies are failing to maintain critical electronic records, survey says

March 4, 2011 After investigating itself for almost a year, the Justice Department reported to the National Archives and Records Administration that it is unable to determine whether any e-mails related to its notorious 2002 "torture memos" were improperly destroyed. Read the whole story on Nextgov.com.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.