Results 21-30 of 36

New pact moves Internet body toward independence

September 29, 2006 The U.S. government will play a lesser role in its oversight role of the no-profit corporation that manages multiple functions of the Internet under an agreement announced Friday. Commerce Department oversight of the Internet Corporation for Assigned Names and Numbers dates back to a 1998 agreement that was set to...

U.S. needs harmonious IT standards, official says

September 25, 2006 The United States needs to establish standards that work together in health information technology so medical personnel can effectively communicate, a top information technology official said. The nation must "ensure that privacy and security standards are up to date" and take steps to prevent data breaches, Robert Kolodner, interim national...

U.S. seeks improvements to sharing of security info

September 11, 2006 Since attacks in the United States five years ago Monday focused world attention on terrorism, the European Union has taken strides to help fight terrorism. However, the United States is currently in discussions with Europe on two information-sharing agreements. According to Jarrod Agen, a spokesman from the U.S. Homeland Security...

Panel examines high-risk technology projects

September 7, 2006 Despite misgivings about releasing the data, the White House Office of Management and Budget will provide a list of the government's high-risk information technology projects to Congress next week, an OMB administrator said during a hearing Thursday. Each quarter, agencies evaluate and report to OMB on the performance of high-risk...

Debate over e-voting is still plaguing elections

August 9, 2006 When George W. Bush was elected president in 2000 amid controversy over paper ballots, the nation quickly moved toward electronic voting systems. Ever since then, the controversy has focused on e-voting, and the battle shows no signs of receding this year. Complaints surfaced anew Tuesday in Georgia, where Rep. Cynthia...

Radio-frequency tracking tags pose recycling challenge

August 7, 2006 As the use of tracking tags grows, some people are concerned by the potential environmental impact of the radio-frequency identification devices. Generally the concerns involve recycling the tags. Joe Dugan, president and CEO of the RFID company RF Code, said there needs to be a U.S. recycling program for the...

Web chat rooms center of FBI probe into terrorist plot

July 7, 2006 On the first anniversary of the London terrorist attacks, U.S. security agents announced Friday they had disrupted a plot by terrorists to attack the New York transportation network. According to the Associated Press, FBI agents were able to discover the scheme through monitoring Internet chat rooms used by extremists. The...

Experts cautiously embrace adoption of wireless ID tags

June 27, 2006 A key lawmaker and others on Tuesday lauded the uses of wireless radio technology but urged firms and others to use caution in deploying the rapidly proliferating tools. Radio-frequency identification technology is great and "one that we shouldn't be afraid of," said Rep. Bob Goodlatte, R-Va. It has been transforming...

Law enforcers want help from social networking sites

June 23, 2006 Efforts to prosecute crimes related to online social-networking sites would be aided if Internet protocol numbers could be accessed once investigations begin, an official said Thursday. "Companies that operate social Web sites have a responsibility" to prevent the improper use of their sites, Steven Del Negro from the Massachusetts Internet...

Military faces challenges in embracing technology

June 19, 2006 Technology has profound positive and negative effects on the nation's security today, a military official said Monday. Cyber terrorism is a good example, Robert Kehler, an Air Force deputy commander at the U.S. Strategic Command, said at the TechNet International conference lunch that opened with prayer and a pledge to...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.