recommended reading


Results 1-10 of 24403

GSA Has New E-Signature Software

December 6 Adobe is selling the technology as a way to help agencies comply with security standards for online services.

US Lead in Quantum Computing 'Under Siege,' Says White House Cyber Adviser

December 6 The nation needs a workforce that can pursue quantum computing.

Top Dems Seek Full Congress Briefing on Russian Election Hacks

December 6 A whole-of-Congress classified briefing is necessitated by the threat the hacks pose to Democratic institutions, the top national security Democrats write.

Commerce Secretary to Industry: Don’t Let Cyber Report Collect Dust

December 6 Penny Pritzker endorses report’s anti-regulation stance, says regulation inhibits cyber info sharing.

Video: Social Media Giants Take on Terrorist Propaganda

December 6 These tech companies are taking a collaborative approach.

How the Government Makes It Easier to Share Cybersecurity Data

December 6 To make the cybersecurity game competitive again, cyber defenders need to let everyone know what they are being hit with, what techniques the attackers are ...

No Agency Gets an A in Latest FITARA Scorecard

December 6 Twelve agencies improved since their May grades, 11 held steady and one—the Transportation Department—dropped.

The Origin of Silicon Valley’s Gender Problem

December 6 In most places, more kids are considering a career in science than a decade ago, but what scientific field differs vastly.

It’s Looking More Likely Everyone in the EU Will Get Free Wi-Fi—Except Those in the UK, Thanks to Brexit

December 6 The free Wi-Fi would be in public spaces like libraries, parks and town squares.

Come Talk About Encryption and Internet of Things Dec. 8

December 6 Join Nextgov for the last Tech + Tequila of 2016.

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.