AUTHOR ARCHIVES

Dashiell Bennett

Results 31-40 of 145

The Afghanistan Negotiations Are Not Going Well

July 10, 2013 Just when it seemed like all the sides were ready to come together to finally end the Afghanistan war, suddenly no one is talking to anyone and peace could not seem farther away. Less than a month after opening a diplomatic office to further the cause of a settlement, the...

The Afghanistan Negotiations Are Not Going Well

July 9, 2013 Just when it seemed like all the sides were ready to come together to finally end the Afghanistan war, suddenly no one is talking to anyone and peace could not seem farther away. Less than a month after opening a diplomatic office to further the cause of a settlement, the...

A New Reconstruction of the Deadly Night in Benghazi

July 8, 2013 A new book purports to tell the "untold story of the attack in Benghazi," but based on the excerpt published in the new Vanity Fair, the newer, more intimate details won't necessarily answer the larger questions about the attack. The excerpt from the upcoming book "Under Fire," focuses on the...

Bush Joins Obama in Remembering the African Embassy Bombings

July 2, 2013 The two American presidents whose administrations have been defined by the war on terror met in Africa Tuesday to honor some of that war's earliest victims. Barack Obama wrapped up his tour of the continent with a stop in Tanzania on Tuesday, where he was met by George W. Bush,...

Do-Nothing Congress Somehow Manages to Do Even Less

July 1, 2013 The 112th Congress (2011-2013, R.I.P.) was relentlessly mocked for its amazing ability to not get things done, but the new edition is on pace to set an even greater standard for futility. The 112th, which ended its last session on January 3, passed 220 laws, the fewest of any Congress...

Senate Votes to Double Border Security Agents

June 25, 2013 Late last night, a group of Republicans Senators teamed up with Democrats to pass an important amendment to the immigration reform bill, but that still might not be enough to save the larger package of laws. The "border surge," which passed by a 67-27 vote will double the number of...

Are Afghan Troops Really 'Getting Good Enough' to Take Over for NATO?

June 18, 2013 Afghanistan's military formally took over responsibility for its own security on Tuesday, accepting the handoff from NATO forces, whether security forces there are ready or not. At a brief ceremony in Kabul this morning, Western forces handed the lead responsibility for all security operations to the Afghanistan's national forces, the...

Obama's Approval Ratings Have Taken a Huge Hit After Scandals

June 17, 2013 A new CNN poll shows President Obama's approval ratings taking a nose dive in recent weeks, a development that is probably not unrelated to the deluge of second-term scandals that have taken over the media. The poll, conducted in the middle of last week, shows the president's disapproval rating at...

Was a U.S. Ambassador Really Soliciting Prostitutes, and Who Covered It Up?

June 10, 2013 CBS News claims that several criminal investigations involving State Department employees, including at least one ambassador, were covered up or ignored in order to avoid embarrassing the diplomatic service. According to a memo written by the department's Inspector General's office, several members of the Diplomatic Security Service, which is in...

What Did Tech Companies Know About the NSA and When Did they Know It?

June 7, 2013 FROM NEXTGOV arrow The technology giants that were implicated in the NSA/data mining bombshell have so vigorously denied any acknowledgment of the program that The Washington Post has had to quietly pull back its claim that the major firms were complicit in the snooping. In the original version of the Post story that...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.