recommended reading

author archives

Results 1-10 of 73

Analysis: Senate Cybersecurity Bill Is Uncontroversial but Also Unambitious

July 12, 2013 While President Obama was busy shooting down the House Intelligence Committee's cybersecurity bill for the second year in a row, the Senate was quietly working on a bill of its own. After months of talks, a draft of the legislation has finally come out—and it looks nothing like the much-reviled...

Edward Snowden Says He Wants to Stay in Russia, for Now

July 12, 2013 Edward Snowden intends to apply for asylum in Russia, according to Human Rights Watch's Tanya Lokshina. For the past half-hour, Lokshina has been meeting with Snowden—along with members of a handful of other human-rights organizations—in his first public appearance since fleeing to Moscow. Snowden said he had received a formal...

The IRS Mistakenly Exposed Thousands of Social Security Numbers

July 8, 2013 Another day, another slipup by the Internal Revenue Service. The incident involves the unwitting exposure of "tens of thousands" of Social Security numbers, according to a recent audit by the independent transparency and public-domain group Public.Resource.org. The identifying numbers were on the Internet for less than 24 hours after being...

Everything Gmail Knows About You and Your Friends

July 8, 2013 When Google hands over e-mail records to the government, it includes basic envelope information, or metadata, that reveals the names and e-mail addresses of senders and recipients in your account. The feds can then mine that information for patterns that might be useful in a law-enforcement investigation. What kind of...

The Number of Times We Could Blow Up the Earth Is Once Again a Secret

July 1, 2013 Collectively, Russia, China, the United States and the world's other nuclear-armed countries possess enough fissile material to blow up the planet many times over. Exactly how many times that is, however, became more of a mystery Monday. At last count, in 2010, the Pentagon revealed it was the proud owner...

Your TV Is Spying on You

June 28, 2013 Political messaging is moving back to the living room. After an election in which Internet tactics seemed to captivate the public, political strategists are turning—or perhaps more accurately, returning—their attention to television advertising. TV isn’t sexy. Or at least, it hasn’t been lately. But with coming developments in user tracking...

How Zombie Phones Could Create a Gigantic, Mobile Botnet

June 26, 2013 You've heard of the botnet — a collection of enslaved, malware-infested computers that act together to pump out spam and DDoS attacks, often unbeknownst to their owners. For the past decade, botnets have mostly been a problem for the PC world. But, according to a new report on mobile malware,...

Edward Snowden Realizes He Can't Live Without WikiLeaks

June 24, 2013 Edward Snowden may not have chosen to go the route of fellow Espionage Act indictee Bradley Manning by releasing sensitive National Security Agency documents through WikiLeaks. Part of that, he said, was because he wanted every single page vetted—not everything was to be revealed at once, and he trusted The...

You Know Who Else 'Inadvertently' Gathered Your Electronic Data?

June 21, 2013 Not long ago, when a Google Street View car came driving down your street, it wasn't just taking pictures to add to Google Maps—it was also scooping up information about local Wi-Fi networks as well as individual e-mail addresses and passwords. The privacy scandal led to formal investigations, international complaints—and...

Can Silicon Valley Stand Up to Washington?

June 21, 2013 Watching Silicon Valley respond to the National Security Agency surveillance uproar has been a bit like watching Iron Man gear up for battle—countless screws whirring themselves into position; armored scales sliding closed; weapons charging; the menacing faceplate slamming solidly shut. One after another, Apple, Facebook, Google, Microsoft and Yahoo have...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.