TECH - ALL ARTICLES

Results 11-20 of 5800
U.S. Secretary of Commerce Penny Pritzker

Commerce Secretary to Industry: Don’t Let Cyber Report Collect Dust

Penny Pritzker endorses report’s anti-regulation stance, says regulation inhibits cyber info sharing.

No Agency Gets an A in Latest FITARA Scorecard

Twelve agencies improved since their May grades, 11 held steady and one—the Transportation Department—dropped.

President Barack Obama and President-elect Donald Trump shake hands following their meeting in the Oval Office.

Cyber Commission Hopes to Brief Trump Before Christmas

Its report includes a laundry list of recommendations for the incoming administration.

Will Donald Trump Dismantle the Internet as We Know It?

Open-web advocates are preparing for a renewed policy war as net neutrality’s future remains uncertain.

Agencies Fail at CIO Authorities in New Scorecards

The low scores indicate FITARA may not be empowering CIOs as originally intended, or at least not as quickly as Congress had hoped.

Customer-Centric Government Won’t Be Great Again in 2017 and Other Government Tech Predictions

Expect cyber and data to remain in the spotlight, while areas like customer service will see less momentum.

Obama’s Cyber Commission Recommends New Cyber Role

The guide also encourages the federal government to cooperate more with industry to promote strong cybersecurity standards.

‘Catastrophic’ Power Outage Nearly Destroyed MSPB’s Electronic Records System

A newly released report shows how devastating a June 2015 incident was to the Merit System Protection Board.

U.S. Chief Data Scientist: 'Time is Now' For Technologists to Jump into Public Service

The data already exists, DJ Patil said, to solve some important crises—if only we could piece together the pieces.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.