recommended reading

author archives

Results 1-10 of 76

How the Interior Department Stopped a Phishing Attack

May 25, 2017 The Interior Department stopped a phishing attack by speeding up its plans to require two-factor authentication for email, the agency’s inspector general said. More than 1,500 Interior employees received an email with a link to what appeared to be the agency’s standard log-in page. Instead, it captured credentials of more...

Report: Mar-a-Lago and Other Trump Properties Have Lax Cybersecurity

May 17, 2017 Unsecured Wi-Fi networks, wireless printers and misconfigured servers represent a few of the poor cybersecurity practices found by reporters who poked around Trump resorts and hotels, including the “Winter White House,” Mar-a-Lago. Armed with a directional Wi-Fi antenna gun and “easily available software,” a team of Gizmodo and ProPublica reporters...

HHS’ Cyber Threat Center Comes Out of Beta Soon

May 12, 2017 The Health and Human Services Department’s nascent cybersecurity center will soon reach initial operating capability to help share threat information with a sector constantly under attack and often short of cyber personnel of its own. Based on the Homeland Security Department's National Cybersecurity and Communications Integration Center, the Healthcare Cybersecurity...

Drones Flying By Airports Coming Soon(ish)

May 5, 2017 The Federal Aviation Administration expects to deliver a prototype of an automated flight certification system this year that will allow drones to fly in controlled airspace, the agency administrator said. “This sets up what is really true integration of unmanned aircraft working in the same space as traditional manned aircraft,”...

Trump's Border Wall Won't Be Made of Concrete If Lawmakers Have Their Way

April 5, 2017 President Donald Trump’s border will be a wall, if the definition of a wall is a combination of technology, border patrol personnel and infrastructure like fencing. But that wall probably won’t cover the whole border, the head of homeland security said. “It’s unlikely that we will build a wall or...

Secret Service Confirms Agency Laptop Stolen

March 17, 2017 The Secret Service Friday confirmed an employee’s agency-issued laptop was stolen. Law enforcement sources said the laptop contains details about Hillary Clinton’s use of a private server and Trump Tower floor plans, ABC News reported. The laptop—along with a bag and coins—was stolen from an agent’s vehicle Thursday morning, according...

2 Russian Spies Charged in Yahoo Breach of 500M Accounts

March 15, 2017 Two members of the Russian intelligence unit that works with the FBI on cyber crime lead a conspiracy to use Yahoo’s email network to target dissidents and government officials, according to the Justice Department. Russian Federal Security Service officers Dmitry Aleksandrovich Dokuchaev, 33, and Igor Anatolyevich Sushchin, 43, allegedly directed...

White House Selects Deputy CTO From Peter Thiel’s Rolodex

March 6, 2017 One of PayPal's cofounders and early Facebook investor Peter Thiel’s aides will step into the role of White House deputy chief technology officer. The White House tapped Michael Kratsios, principal and chief of staff at Thiel Capital, for the post in the Office of Science and Technology, according to Politico....

Mattis Wants Pentagon's New Acquisition Roles Defined

February 22, 2017 Defense Secretary Jim Mattis tasked his deputy secretary with mapping out the department’s acquisition organization and where new roles like the chief innovation officer could fit in. Addressed to Deputy Defense Secretary Robert Work, a pair of memos released Friday address organizational changes required by the National Defense Authorization Act...

Lawmakers Want Social Media Vetted for All Visa Applicants and Ask More Mar-a-Lago Questions

February 17, 2017 As Congress heads out for its first recess, a freshman’s first bill would require the Homeland Security Department to vet social media accounts for anyone applying for a U.S. visa. In addition to reviewing all of an applicant’s publicly available social media, the Visa Investigation and Social Media Act, proposed...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.