recommended reading

author archives

Bob Brewin

Editor at Large

Bob Brewin joined Government Executive in April 2007, bringing with him more than 20 years of experience as a journalist focusing on defense issues and technology. Bob covers the world of defense and information technology for Nextgov, and is the author of the “What’s Brewin” blog.

Results 2391-2400 of 3080

Butler Tapped for Cyber/Space Policy Slot

August 11, 2009 The Defense Department appointed Robert Butler, who previously ran Computer Science Corp's military intelligence biz in San Antonio, Texas, as the new deputy assistant secretary of defense for cyber and space policy. Butler, who will get to wear senior executive service pips in his new job, has extensive cyber experience...

General Eyeing Top Doc Job?

August 10, 2009 I'm picking up medium strength signals that retired Army Gen. Elder Granger, who served as program executive officer for the TRICARE management activity in the Military Health System, would really like to become the next assistant secretary of Defense for Health Affairs, replacing Dr. S. Ward Casscells, who retired this...

Defense asks the public for help forming social media policy

August 10, 2009 How do you develop a policy for using social media in the Defense Department that balances security with the strongly held desire to communicate with a deployed family member? The answer is simple, according to Jack Holt, senior strategist for new media in the Pentagon: Start a blog, the first...

Marines and Social Nets: We Goofed

August 7, 2009 Despite more than 1,000 news reports to the contrary, the Marine Corps did NOT ban access to social network sites this week. In fact, in a statement, the Marine Corps said, "Marines are encouraged to tell their stories on social networking sites, using personal accounts, remembering the importance of operational...

U.K. Defence Ministry encourages troops to use social media

August 7, 2009 While the Pentagon studies the vulnerabilities of social networking sites, the United Kingdom's Defence Ministry issued a policy on Thursday that encouraged its troops to "blog, Tweet and engage online." According to the Online Engagement Guidelines, U.K. troops "can make full use of Web sites such as Facebook and YouTube...

Are VA and Defense Chopped Liver?

August 6, 2009 That's the assumption I made after viewing today's meeting of the President's Council of Advisors on Science and Technology, which had an in-depth discussion on President Obama's national health IT plan. Somehow they ignored electronic health record systems that cover 9.2 million patients in the Defense Department and another 6.1...

from govexec

From Google, Microsoft executives criticize Obama's e-health records plan

August 6, 2009 Top executives at Google and Microsoft sharply questioned the structure of the Obama administration's $20 billion health information technology plan at a meeting of a presidential technology council on Thursday. Read the full story on

Google, Microsoft executives criticize Obama's e-health records plan

August 6, 2009 Google CEO Eric Schmidt says patients should have access to their records in a national health network.Newscom Top executives at Google and Microsoft sharply questioned the structure of the Obama administration's $20 billion health information technology plan at a meeting of a presidential technology council on Thursday. Eric Schmidt, chairman...

Defense hands over commercial satellite procurement to GSA

August 6, 2009 The General Services Administration will manage the purchase of $5 billion worth of commercial satellite services during the next 10 years for all federal agencies, including the Defense Department, under an agreement announced on Thursday. According to the pact between the agency and the Defense Information Systems Agency, GSA will...

Another Stolen Laptop

August 5, 2009 Laptops containing personnel information from departments like Veterans Affairs and Education keep going on unauthorized walks. Now it's the National Guard Bureau's turn, which alerted soldiers on Wednesday of a stolen laptop. Ray Noller, a spokesman for the bureau, the Pentagon outfit that oversees the Army and Air Force national...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.