recommended reading

author archives

Results 31-40 of 281

DHS chief says she doesn't use e-mail

September 28, 2012 Homeland Security Secretary Janet Napolitano, who is a key player in national cybersecurity efforts, said on Friday she doesn't use e-mail. "Don't laugh, but I just don't use e-mail at all," she said during a discussion at a Cybersecurity Summit hosted by National Journal and Government Executive. She didn't explain...

American industry groups dissect EU cloud computing report

September 28, 2012 American industry groups are welcoming a new European Union strategy for streamlining cloud computing networks, but not everyone likes the specifics. The EU document, "Unleashing the Potential of Cloud Computing in Europe," is designed to help harmonize policies for cloud computing networks, which store information on remote servers accessed over...

Senators: FDA should protect medical implants from hackers

September 27, 2012 Citing a new government watchdog report, three House Democrats want the Food and Drug Administration to better protect implantable medical devices from hackers. "Wireless medical devices are susceptible to increasingly advanced hacking techniques that could threaten patient health," said Rep. Ed Markey, D-Mass., in a statement. "Patients need to be...

Cybersecurity order 'close to completion'

September 20, 2012 A White House executive order on cybersecurity is “close to completion,” but Congress will still need to act to ensure security for American networks, Homeland Security Secretary Janet Napolitano said on Wednesday. The draft order is being reviewed at the "highest levels" and some issues still need to be ironed...

Senate panel approves Internet freedom resolution

September 20, 2012 The Senate Foreign Relations Committee on Wednesday unanimously approved a resolution calling on the United States to prevent the United Nations from having a greater role in governing the Internet. The nonbinding resolution, which mirrors one passed by the House in August, instructs Secretary of State Hillary Clinton to pursue...

Undercover police used smartphones to keep tabs on protests in Tampa

September 18, 2012 A network that allowed undercover police to use smartphones and tablets to monitor and communicate during protests at the Republican National Convention is giving new meaning to having “eyes on the ground.” Police have long maintained an undercover presence at major gatherings, including political protests — not to monitor free...

GOP Senators assail White House for pushing executive order on cybersecurity

September 14, 2012 Top Republican critics of a White House-backed Senate cybersecurity bill on Thursday criticized the White House’s threat to issue an executive order on the issue. Sens. John McCain, R-Ariz., Kay Bailey Hutchison, R-Texas, and Saxby Chambliss, R-Ga., penned a Wall Street Journal op-ed decrying White House plans to “tighten the...

Senate unlikely to revisit cybersecurity bill before election, Lieberman says

September 12, 2012 Senate Homeland Security Chairman Joe Lieberman, I-Conn., told National Journal on Tuesday there is little chance the Senate will revisit his proposed cybersecurity legislation until after the November election. Lieberman, a lead sponsor of the Cybersecurity Act of 2012, also said he supports a review by the White House of...

Commission leaders call for emergency communications network

September 11, 2012 The former heads of the commission that investigated the terror attacks of Sept. 11, 2001, pointed on Tuesday to unfinished plans for a nationwide emergency communications system. The attacks revealed the problems posed by a patchwork of emergency radio networks and devices that often do not work with each other....

9/11 haunts debate over cybersecurity

September 11, 2012 More than a decade after the Sept. 11, 2001, terrorist attacks, the tragedy haunts Washington policymakers who are deadlocked over how to protect the country against cyberattacks. Current and former government officials have spent months pointing to 9/11 as a harbinger of what could occur if Congress, federal agencies, and...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.