recommended reading

author archives

Results 1-10 of 145

The Future of Privacy Is Plausible Deniability

October 30, 2016 The successful breach of John Podesta’s email account is the latest high-profile hack to expose thousands upon thousands of private missives to the public. With the Sony Pictures debacle in the recent past and no prospect of perfect digital security, more breaches seem inevitable. So why do email providers, organizations...

Trump’s Plea to Russian Hackers Foreshadows a Dangerous Stance on NSA Surveillance

July 28, 2016 PHILADELPHIA––On Wednesday, Leon Panetta, the former director of the CIA, declared on stage at the DNC that the Republican Party’s nominee is unfit for office. He was responding in part to news that Donald Trump “hoped Russian intelligence services had successfully hacked Hillary Clinton’s email, and encouraged them to publish...

from govexec

Trump Shows the Flaws of NSA Surveillance

July 28, 2016 PHILADELPHIA––On Wednesday, Leon Panetta, the former director of the CIA, declared on stage at the DNC that the Republican Party’s nominee is unfit for office. He was responding in part to news that Donald Trump “hoped Russian intelligence services had successfully hacked Hillary Clinton’s email, and encouraged them to publish...

'We Are Not Frozen in a Nightmare,' Says Defiant John Kerry

June 29, 2016 Amid tumult in world affairs, with a deadly attack on an airport in Istanbul, Turkey, EU countries grappling with Britain’s impending exit, and an ongoing war against ISIS, Secretary of State John Kerry sought to reassure an Aspen audience Tuesday that “the world is not witnessing global gridlock. We are...

from govexec

John Kerry: "We Are Not Frozen in a Nightmare"

June 29, 2016 Amid tumult in world affairs, with a deadly attack on an airport in Istanbul, Turkey, EU countries grappling with Britain’s impending exit, and an ongoing war against ISIS, Secretary of State John Kerry sought to reassure an Aspen audience Tuesday that “the world is not witnessing global gridlock. We are...

Should the Careless Be Punished for Getting Hacked?

June 27, 2016 Nearly everyone with internet access is harmed, at least indirectly, by digital criminals. Josephine Wolff, a professor at the Rochester Institute of Technology, believes cybersecurity policy would benefit from a debate about if and when it might be appropriate to punish careless computer users for their role in enabling those...

from govexec

The Senate's Anti-Encryption Bill Could Become a Problem

April 14, 2016 A generation ago—after America’s spy agencies were exposed as perpetrators of massive civil-rights violations, abuses of power, and misdeeds abroad—oversight committees were created to protect liberal democracy from the national security state. Senators Dianne Feinstein and Richard Burr now sit on one of those committees. And they are not just...

What We Know About the Brussels Attacks

March 22, 2016 Updated on March 22 at 6:52 p.m. ET Here’s what we know so far: —There were two explosions at Brussels’s Zaventem airport at about 8 a.m. local time (3 a.m. ET) and one on the city’s metro system. —The Belgian government’s Crisis Center said a dozen people were killed at...

from govexec

Explosions Hit Brussels Airport and Metro Station, Killing at Least 26

March 22, 2016 Explosions have hit Brussels airport and a main metro station, Belgian officials say, and, according to news reports and the transit agency, at least 26 people have been killed. “What we feared has happened,” Belgian Prime Minister Charles Michel said during a televised news conference. “We were hit by blind...

from govexec

The Obama Administration's Drone-Strike Dissembling

March 14, 2016 As a frequent critic of the Obama administration’s foreign policy, I found Jeffrey Goldberg’s excellent interview a useful reminder that, for all my misgivings aboutthe Iraq War hawks that Barack Obama elevated, his persecution of whistleblowers, his decision to assassinate an American without due process, and his flagrantly illegal warmaking...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.