Results 1-10 of 11013
"The IG has found no proof of actual misconduct,” said Rep. Gerry Connolly, D-Va.

Lawmakers Press Patent Office for Crackdown on Timecard Abuse

Republicans demand list of employees disciplined, union leader’s calendar.

John H. Glenn Jr. dons his silver Mercury pressure suit in preparation for launch in 1962.

Remembering John Glenn

The former senator and first American to orbit the Earth has died at 95.

IRS chief John Koskinen (left) speaks with Rep. Jim Jordan, R-Ohio, before a September hearing on Koskinen's impeachment.

Lawmaker Seeking to Impeach IRS Chief Targets Public Service Award

Rep. Jordan uses unrelated hearing to challenge public administration academy.

Everything's coming up Trump in 2016.

Play of the Day: Donald Trump is 2016's Person of the Year

The most impressive thing about Trump's Time cover? A photographer got him to sit still and not tweet for 30 seconds.

Obama Says That in America You 'Can Criticize a President — Without Retribution'

Parts of Obama's national security speech sounded like a veiled message to Donald Trump.

This one is good enough for the president-elect.

Play of the Day: Trump and Boeing

The president-elect does not want a new Air Force One.

Play of the Day: Ben Carson is Ready to Run the Housing Department

After all, he owns a house and he says he once lived in public housing. That's enough, right?

Donald Trump smiles as he speaks during the first stop of his post-election tour Thursday in Cincinnati.

Play of the Day: The Trump Thank You Tour Begins

Starting in Ohio, the president-elect is speaking to adoring crowds who chant his name.

Sen. Ron Johnson, R-Wis., is one of the senators making the request.

Lawmakers Ask Obama to Freeze Hiring Until Trump Arrives

Republican senators warn against “burrowing in” and new career hires who won’t help execute the next administration’s policies.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.