AUTHOR ARCHIVES

Daniel Thomas

Research Analyst, Government Business Council Daniel Thomas is a research analyst at Government Business Council, where he writes about defense and technology issues affecting the government. He holds a master's degree in linguistics from University of York and a bachelor's degree in English from Birmingham-Southern College.
Results 41-50 of 55

Securing The Perimeters: A Candid Survey on Cybersecurity in State and Local Governments

October 31, 2016 State and local governments face a multitude of cybersecurity threats unique to their regional and municipal oversight. To assess the perceptions and experiences that state and local leaders have about cybersecurity in their respective governments, GBC recently deployed a survey to 328 state and local leaders. Download this GBC Insight...

Awareness & Analytics: Weapons of Choice in State & Local Cybersecurity

October 31, 2016 State and local governments face a multitude of cybersecurity threats unique to their regional and municipal oversight. To compensate for these challenges, agencies across the nation must recognize the critical urgency of innovative tactics and analytics solutions for maintaining the strongest defense. But are they doing so? Download this GBC...

Government Executive 2016 Presidential Poll: October 28, 2016

October 28, 2016 As reported exclusively by Government Executive. Hillary Clinton has cemented her lead over Donald Trump among federal government employees, according to an independent Government Business Council / GovExec.com poll released on October 28, 2016. Clinton receives 53% of the vote, compared with 34% for Trump; in addition, Clinton holds a...

Tracking Fraud & Abuse Across the Nation

October 12, 2016 President Obama’s 2011 Executive Order launched a nationwide effort to curtail waste, fraud, and improper payments across federal, state, and local governments. To better understand how federal, state, and local government leaders assess their organization’s fraud management capabilities, GBC recently deployed a survey to 340 leaders representing these sectors. Download...

The Threat From Within: To Combat Evolving Insider Threats, Government Must Adapt

September 20, 2016 When it comes to fighting insider threats, the ‘one-size-fits-all’ approach is woefully inadequate. Human behavior is multifaceted, variable, and naturally resistant to a unilateral analytics approach. That means a variety of aversion and detection tactics are needed to stop an insider threat in its tracks, tactics which go well beyond...

Healthcare Analytics in America

September 14, 2016 In this card series, Government Business Council, the research arm of Government Executive, presents a snapshot of healthcare analytics across the nation: its innovators and pioneers, its state and local leaders, and the recent tide of efforts aimed at harnessing data for improved patient outcomes. View the full Insight card...

Minding The Gaps: Diagnosing Privileged Access Risks in State & Local Government

September 12, 2016 Due to their elevated access to secure networks, privileged users and accounts represent high-value targets to enemies seeking to steal sensitive data or access government systems. While the federal government has taken steps to reduce the number of privileged users and regulate their access more efficiently, the situation in state...

The Next Federal Evolution of Cloud

August 8, 2016 Five years ago, the White House put cloud computing on the federal map by insisting that agencies adopt a Cloud First policy. The first fruits of these investments are now paying off, and with the recent announcement of a revitalized FedRAMP, the timing couldn’t be better for agencies capitalizing on...

A DevOps Roadmap for the Federal Government

August 1, 2016 The DevOps culture continues to be a huge driver for the private sector tech industry. With its emphasis on close collaboration between development and operations, DevOps provides a promising roadmap for the federal government as it seeks to position its services for a more digitally literate public. However, the leap...