recommended reading

author archives

Brittany Ballenstedt


Reporter Portrait for
Brittany Ballenstedt writes Nextgov's Wired Workplace blog, which delves into the issues facing employees who work in the federal information technology sector. Before joining Nextgov, Brittany covered federal pay and benefits issues as a staff correspondent for Government Executive and served as an associate editor for National Journal's Technology Daily. She holds a bachelor's degree in journalism from Mansfield University and originally hails from Pennsylvania. She currently lives near Travis Air Force Base, Calif., where her husband is stationed.

Results 11-20 of 1848

What the University of the Future Will Look Like

June 11, 2014 Four years ago, Microsoft Founder Bill Gates predicted that technology and the Internet would make “place-based colleges” less relevant and bring down the cost of a college education to just $2,000. Now, students around the world tend to agree, with many citing a belief that the university of the future...

Survey: Up to 70 Percent of Government IT Staff Will Depart Within 5 Years

June 10, 2014 Attracting, retaining and developing key IT talent remains the top challenge among federal chief information officers and chief information security officers, according to a new survey. The survey of 59 federal CIOs, CISOs, information resource management officials and congressional oversight committee staff by TechAmerica and Grant Thornton, found that 52...

Webinars Are on the Rise as Federal Conference Spending Shrinks

June 6, 2014 Shrinking budgets and a crackdown on conference spending have federal employees attending fewer in-person events than in past years, yet more are making up for it through online training and webinars. That’s according to a new study by Market Connections that found less than half (42 percent) of the more...

When Federal CIOs and Hiring Staff Work Together for IT Talent

June 5, 2014 Numerous reports have pointed to the need for agency chief information officers to connect with their counterparts in the human capital office to determine how best to recruit, hire and retain top information technology talent into the federal government. That will be one topic at this year’s CIO Council Boot...

Cyber Workforce Honor Roll

June 4, 2014 Several achievements of federal employees and contractors working in the cybersecurity field were honored Tuesday evening as part of the 2014 Government Information Security Leadership Awards. The annual awards program, run by consulting firm (ISC)2, recognizes individuals and teams who have significantly enhanced the information security workforce by demonstrating a...

What Google Lacks in Diversity It Makes Up for in Salaries

June 3, 2014 Google last week made public its own workforce data showing it is made up of mostly white and male employees, in a move the company hopes will open up the conversation about the need for more women and minorities in technology fields in general. Diversifying the tech talent pool would...

Lack of Training Hampers Agency Cyber Incident Response

June 2, 2014 Federal agencies have not demonstrated that they are effectively responding to cybersecurity breaches or incidents, in part due to a lack of employee training on incident response roles, according to a new report by the Government Accountability Office. GAO detailed its analysis of a statistical sample of cyber incidents reported...

The Link Between STEM Training and Civil Rights

May 29, 2014 Securing America’s future in science, technology, engineering and math fields requires more than expanding opportunities for women. Promoting interest and opportunities for minorities also should be a national imperative, particularly as more than half of children born in the United States today are of minority descent. That was the topic...

Preparing for a Shortage of Feds in Science and Tech

May 28, 2014 While the federal government has developed a strategy to close the workforce gap in science, technology, engineering, mathematics and medical fields, little has been done to address specific gaps in these fields in the federal government, according to a new report. The report, released last week by the IBM Center...

White House Spotlights Contributions of Girls in STEM

May 27, 2014 The White House on Tuesday welcomed some of America’s most innovative students for the fourth-ever White House Science Fair, which this year emphasized the specific contributions of girls and young women who are excelling in science, technology, engineering and math. Among those highlighted at the conference was Elana Simon, 18,...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.