Results 181-190 of 197

Bush's e-government budget faces fight in Congress

August 14, 2001 When the Bush administration issued its fiscal 2002 budget plan in the spring, two things were clear: The administration was touting e-government, for which it had requested $100 million over three years, and no details of its plans on spending the money were available. Now, as Congress is preparing to...

Few agencies get technology boosts in Bush budget

April 24, 2001 Despite claims by the White House that its fiscal 2002 budget proposal aims to move government online, a look at the budget shows that not all agencies received a boost in funding for their internal information technology systems. The National Science Foundation (NSF) did not include IT funding in its...

Bush budget would fund existing advanced technology projects

April 19, 2001 The fiscal 2002 budget request released by President Bush last week contains a request for $13 million for the Advanced Technology Program (ATP), but the money would go toward only existing projects from previous years, officials said. "The $13 million is what we are requesting in funding based on grants...

Bush budget extends life of critical infrastructure office

April 17, 2001 The budget proposal issued last week by President Bush revives a coordinating office for federal initiatives on the protection of the nation's critical infrastructure, but the structure of the office has not been determined. Under the Bush budget, the Critical Infrastructure Assurance Office (CIAO), launched by President Clinton and slated...

FBI struggles to retain cybercrime experts

April 5, 2001 The FBI suffers from a high turnover of experts in cybercrime but continues to get quality people, FBI Director Louis Freeh said Wednesday. "There's a bull market" for skilled FBI cyber-crime workers, Freeh told a World Economic Forum event held at the U.S. Chamber of Commerce. In order to keep...

House chair concerned about IT accessibility rules

March 22, 2001 A House lawmaker who oversees government procurement of technology products on Wednesday praised new rules designed to make the government's information technology more accessible to the disabled but found fault with several specific items in those rules. "I do have concerns about particular sections of the regulations that appear to...

Experts assess government role in online security

March 7, 2001 Government and private-sector experts in Internet security on Tuesday gave their assessments of how government should help guard against inevitable cyber attacks from an array of likely foes. John Tritak, director of the federal Critical Infrastructure Assurance Office (CIAO), said government must take a lead in the ensuring that the...

Labor lobbies Congress in defense of ergonomics rule

March 5, 2001 Labor groups, led by the AFL-CIO, Friday launched a "full- scale" lobbying campaign to convince Congress not to erase a Clinton administration regulation requiring employers to add steps to prevent their workers' repetitive-stress injuries. "This is the biggest health and job safety issue in the country," said Peg Seminario, director...

Government, business divided on cybersecurity

February 16, 2001 The high-tech industry and federal officials long have argued over the level of protection necessary to effectively maintain the health of the nation's critical infrastructure, and the Center for Strategic and International Studies addresses the issue in a preliminary report issued this week. "Some are saying we need government, others...

Bush weighs future of computer security office

February 13, 2001 The Bush administration is reviewing whether to continue the operations of the government office that coordinates critical infrastructure policy, according to the head of the office, which is slated for termination this fall. John Tritak, director of the Critical Infrastructure Assurance Office (CIAO), said in an interview Monday that the...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.