recommended reading

State of the union fails to leverage tech-savvy administration

Anyone expecting the leader of the most technology-focused White House to date to offer an innovation roadmap for the battered economy was probably disappointed in President Obama's state of the union address Tuesday evening.

Obama made a glancing reference to recently-announced plans for, a new federal website to help entrepreneurs, businesses and the unemployed navigate mountains of relevant federal data, when he mentioned the experiences of Jackie Bray, "a single mom from North Carolina who was laid off from her job as a mechanic."

"I want to cut through the maze of confusing training programs, so that from now on, people like Jackie have one program, one website, and one place to go for all the information and help they need. It is time to turn our unemployment system into a reemployment system that puts people to work," Obama said.

He also raised the issue of cybersecurity: "To stay one step ahead of our adversaries, I have already sent this Congress legislation that will secure our country from the growing danger of cyberthreats" -- a reference to the White House cyber proposal introduced on Capitol Hill last May.

"This is nothing less than a matter of national security," said Sen. Joe Lieberman, I-Conn., in a statement. "The Secretary of Defense has warned that the next Pearl Harbor could be a cyber attack. Our systems are being tested, probed, and attacked on a minute-by-minute basis by hackers, criminals, and foreign powers. And we are losing our intellectual property and military and industrial secrets to cyber thieves at an alarming pace."

Most of the address was focused on domestic issues, and references to technology and innovation didn't suggest any new programs in the offing, although Obama did urge lawmakers to "tear down regulations that prevent aspiring entrepreneurs from getting the financing to grow" and invest in basic research.

"Don't let other countries win the race for the future," Obama said. "Support the same kind of research and innovation that led to the computer chip and the Internet; to new American jobs and new American industries."

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.