recommended reading

author archives

Results 31-40 of 75

from govexec

Sasha and Malia's Spring Break Will Not Ruin the Republic

March 29, 2013 Sasha and Malia's trip to the Bahamas or Idaho or wherever they are is expensive, lavish, and depending on who you ask perhaps a bit wasteful—just like Bush daughters' trip to Argentina and the Carters, Fords, and Eisenhowers' trips to Europe, or any other First Family member moves with a...

from govexec

Analysis: The U.S. Flew B-2 Bombers Over Korea Because It Can

March 28, 2013 So we know North Korea has a habit of puffing its chest and it feels like Kim Jong-Un's country declares the annihilation of its enemies seemingly every other day now. But with the U.S. announcing that they're practicing stealth bombing runs over the Korean peninsula, it's a sign that the...

Who's Using Chemical Weapons in Syria Now?

March 19, 2013 Opposition forces and the Syrian regime agree that there was an attack in the dangerous Aleppo province that killed at least 16 people and wounded around 86 on Tuesday. And both are claiming, to some extent, that there were chemical weapons involved. The one thing they can't agree on is...

The Army Doesn't Want You to See the Results of Its Shady PTSD Probe

February 28, 2013 This past fall, the Army found out the results of a probe meant to determine if psychiatrists were reversing soldiers' PTSD diagnoses to save the government money by denying them medical retirements. Months later, they still don't want anyone knowing what's in those files. The Army has refused to release...

China Says U.S. Is on Offense in Hacking Attacks on Defense Ministry

February 28, 2013 Ten days to the day that cyber security firm Mandiant released a blistering report on China's state-sponsored sustained hacking of the United States's vital infrastructure and top companies, the Chinese Ministry of Defense has its own report about the U.S. hacking two vital military sites. "According to the IP addresses,...

China Says the U.S. Is Actually the Hacker You Should Be Worried About

February 20, 2013 Days after cybersecurity firm Mandiant published an eye-popping report of state-sponsored cyber espionage by the China's People’s Liberation Army, the Chinese have fired back. They're not only denying that they are behind the attack, they also say that they're actually the victim and that the United States of America is...

Anonymous Wants to Ruin Your State of the Union Livestream

February 12, 2013 Another big, bad Anonymous hack is knocking on cyber doorsteps — and freaking out Washington: The do-gooder hacking collective plans to target cord cutters and anyone using the Internet to watch the State of the Union address online, blacking out President Obama's speech for the causes of Aaron Swartz, the...

Are Spy Drones Being Used to Find Fugitive Christopher Dorner?

February 11, 2013 The Internet erupted with some pretty shocking news yesterday: that the police were using drones to find wanted cop-killer Christopher Dorner. If true, it would be another odd turn in this massive manhunt, but despite claims to the contrary, he wouldn't be the first human target on American soil. London's...

North Korean video imagines what it would be like to wipe out a U.S. city

February 5, 2013 North Korea likes to drop hints about annihilating the United States with nuclear weapons, but just to make it clear, they've produced a helpful propaganda film to show exactly how that's going to go down. The video—which was posted on one of North Korea's official propaganda websites, Uriminzokkiri, over the...

You might want to be prepared for two North Korean nuclear tests

February 4, 2013 Not satisfied with upsetting the entire world with a new nuclear weapons test, there's now speculation that North Korea may be planning two tests, possibly back-to-back or even simultaneously. When last we had checked with them, there were reports that the North Koreans were camouflaging an entrance to one of...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.