Results 71-80 of 197

Data sharing deemed critical to tracking terrorist cash

September 24, 2003 A panel of federal officials on Wednesday told a House subcommittee that information sharing is critical to the reduction of funding to terrorists and said improvements have been made in the area since the terrorist attacks on the United States two years ago. But an FBI official said law enforcement...

Law enforcement official says threat center could be permanent

September 23, 2003 Three top federal law enforcement officials on Tuesday defended the evolving process the government is using to analyze and share information about terrorist activities. The officials testified before the Senate Judiciary Immigration and Border Security Subcommittee. John Brennan, director of the Terrorist Threat Integration Center (TTIC), said a TTIC Web...

Federal officials detail response to August blackout

September 17, 2003 As the East Coast braced for a high-powered hurricane, House lawmakers on Wednesday heard from federal critical infrastructure experts on what happened during the August power outage in parts of the United States and Canada. Robert Liscouski, the Homeland Security Department's assistant secretary for infrastructure protection, described how his directorate...

National 'cyber summit' planned to aid federal outreach

September 16, 2003 The Homeland Security Department is planning to hold a national "cyber summit" this fall to address shortcomings in outreach efforts to state and local governments and the private sector on improving cybersecurity practices. "That's where much of our work has to be done yet," Robert Liscouski, the department's assistant secretary...

Commerce under pressure to clean up giant Web database

September 12, 2003 A little-known global database of Web site owners has grown into a significant worldwide cyber-crime tracking device-and a major source of concern to privacy advocates and foreign governments. Despite its growing importance, the so-called "Whois" data is plagued with inaccuracies, as well as technical, legal, and ethical problems. The Commerce...

House chairman favors temporary terrorist-threat center

September 5, 2003 The new Terrorist Threat Integration Center (TTIC) for compiling terrorism information from various agencies must be temporary if the Homeland Security Department is not to violate its statutory requirements, the chairman of a congressional oversight committee said on Friday. "It's very plain if one reads the act [establishing the department]...

'Open source' software trend faces barriers

August 25, 2003 Federal, state and local governments around the world are catching "open source" fever, purchasing software that lets them view and modify source code as opposed to proprietary software such as that made by Microsoft. But whether the global trend will continue may depend upon new and old factors that could...

Information technology permeates Defense appropriations bills

August 22, 2003 The Defense Department appropriations bills passed by Congress are peppered with references to information technology programs. Defense appropriations eclipse all other agencies in the federal government. The White House requested $372 billion overall; the House provided $369 billion, the Senate $386.6 billion. The House offered $27.6 billion for information technology,...

Proposals for Homeland Security include similar science, tech figures

August 18, 2003 The congressional proposals for funding of science and technology initiatives for the Homeland Security Department in fiscal 2004 are largely aligned, according to the Appropriations Committee reports from the House and Senate. The House version of the bill, H.R. 2555, would provide $900.4 million for science and technology, including $35...

Congress lowers funding for intelligence, cybersecurity

August 15, 2003 The House and Senate showed a reluctance to fully fund the White House's budget request for Homeland Security Department's work on intelligence and infrastructure protection in legislation that would fund the department for fiscal 2004. "The committee is aware of the recent and rapid stand-up of the information analysis and...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.