recommended reading

author archives

Results 41-50 of 281

Democratic lawmakers praise Internet freedom platform

September 7, 2012 Democratic lawmakers are praising language in their newly approved party platform that calls for protections for an open and free Internet. "This platform reaffirms our strong commitment to protecting free expression, privacy, and our fundamental right to assemble online free from centralized government control as we do in our everyday...

Hackers allegedly hold Romney tax returns for ransom

September 6, 2012 The Secret Service is investigating the reported theft of copies of Mitt Romney's tax returns, the Associated Press reported on Wednesday. A message posted on a website frequented by hackers claims to have obtained copies of the coveted tax returns from a Tennessee office of PricewaterhouseCoopers, which has handled Romney's...

Clinton, Chinese officials eye cooperation to strengthen cybersecurity, prevent IP theft

September 5, 2012 Secretary of State Hillary Clinton and Chinese Foreign Minister Yang Jiechi expressed interest on Wednesday in working together on issues like cybersecurity and theft of intellectual property, problems that have complicated the relationship between the two plugged-in countries. "Both the United States and China are victims of cyberattacks," Clinton said...

'Internet freedom' touted by both parties

September 5, 2012 In a party platform unveiled on Tuesday, Democrats don't shy away from trumpeting what they see as President Obama's role in protecting Internet freedom not only in the United States, but around the world. “The Obama administration has led the world to recognize and defend Internet freedom—the freedom of expression,...

Former cybersecurity czar urges Obama to issue executive order to protect networks

August 31, 2012 Absent congressional action on cybersecurity, President Obama should strongly consider issuing an executive order to help secure American computer networks from attack, a chief architect of the White House’s cybersecurity proposals told National Journal. Former White House cybersecurity chief Howard Schmidt, who served in both the Obama and George W....

Porn exec on GOP's 'family-friendly' platform: 'Sex is everywhere'

August 30, 2012 First there was a Republican war on women. Now the GOP has declared war on the all-American porn user. That's according to an executive with the adult movie company Vivid Entertainment who warned Republicans on Thursday to be less, ahem, "vigorous" in their approach to pornography. During this week's GOP...

New tool for hurricane trackers: drones

August 29, 2012 Federal hurricane trackers this year will be experimenting with powerful new tools: unmanned boats and aircraft, including a massive drone more known for spying on battlefields than monitoring nature’s violence. Researchers at NASA and the National Oceanic and Atmospheric Administration are hoping a pair of military-surplus Global Hawk spy drones...

GOP platform blasts Obama on tech policy

August 29, 2012 Republicans in Tampa on Tuesday called for protections of Internet freedom, less telecom regulation, and family-friendly online content in a party platform that also criticized President Obama’s “Luddite approach” to technology policy. Obama has often been cast as a tech-savvy president who carries his own smartphone and understands the fast-paced...

FAA revisits mobile electronic devices on aircraft

August 27, 2012 The Federal Aviation Administration on Monday launched a government-industry working group to determine whether more electronic devices can be safely used on aircraft during flight. Current FCC regulations require aircraft operators to determine whether interference from a given mobile electronic devices could cause safety risks before allowing such devices to...

Obama faces delicate decisions as cyberattack fears rise

August 23, 2012 At the height of the economic crisis in 2008, Saturday Night Live’s “Weekend Update” comedy news show rolled out the character Oscar Rogers as a faux financial commentator. His advice on how to restore the economy? “Fix it! It needs to be fixed! Now!” Four years later, lawmakers are grappling...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.