recommended reading

author archives

Results 41-50 of 281

Democratic lawmakers praise Internet freedom platform

September 7, 2012 Democratic lawmakers are praising language in their newly approved party platform that calls for protections for an open and free Internet. "This platform reaffirms our strong commitment to protecting free expression, privacy, and our fundamental right to assemble online free from centralized government control as we do in our everyday...

Hackers allegedly hold Romney tax returns for ransom

September 6, 2012 The Secret Service is investigating the reported theft of copies of Mitt Romney's tax returns, the Associated Press reported on Wednesday. A message posted on a website frequented by hackers claims to have obtained copies of the coveted tax returns from a Tennessee office of PricewaterhouseCoopers, which has handled Romney's...

Clinton, Chinese officials eye cooperation to strengthen cybersecurity, prevent IP theft

September 5, 2012 Secretary of State Hillary Clinton and Chinese Foreign Minister Yang Jiechi expressed interest on Wednesday in working together on issues like cybersecurity and theft of intellectual property, problems that have complicated the relationship between the two plugged-in countries. "Both the United States and China are victims of cyberattacks," Clinton said...

'Internet freedom' touted by both parties

September 5, 2012 In a party platform unveiled on Tuesday, Democrats don't shy away from trumpeting what they see as President Obama's role in protecting Internet freedom not only in the United States, but around the world. “The Obama administration has led the world to recognize and defend Internet freedom—the freedom of expression,...

Former cybersecurity czar urges Obama to issue executive order to protect networks

August 31, 2012 Absent congressional action on cybersecurity, President Obama should strongly consider issuing an executive order to help secure American computer networks from attack, a chief architect of the White House’s cybersecurity proposals told National Journal. Former White House cybersecurity chief Howard Schmidt, who served in both the Obama and George W....

Porn exec on GOP's 'family-friendly' platform: 'Sex is everywhere'

August 30, 2012 First there was a Republican war on women. Now the GOP has declared war on the all-American porn user. That's according to an executive with the adult movie company Vivid Entertainment who warned Republicans on Thursday to be less, ahem, "vigorous" in their approach to pornography. During this week's GOP...

New tool for hurricane trackers: drones

August 29, 2012 Federal hurricane trackers this year will be experimenting with powerful new tools: unmanned boats and aircraft, including a massive drone more known for spying on battlefields than monitoring nature’s violence. Researchers at NASA and the National Oceanic and Atmospheric Administration are hoping a pair of military-surplus Global Hawk spy drones...

GOP platform blasts Obama on tech policy

August 29, 2012 Republicans in Tampa on Tuesday called for protections of Internet freedom, less telecom regulation, and family-friendly online content in a party platform that also criticized President Obama’s “Luddite approach” to technology policy. Obama has often been cast as a tech-savvy president who carries his own smartphone and understands the fast-paced...

FAA revisits mobile electronic devices on aircraft

August 27, 2012 The Federal Aviation Administration on Monday launched a government-industry working group to determine whether more electronic devices can be safely used on aircraft during flight. Current FCC regulations require aircraft operators to determine whether interference from a given mobile electronic devices could cause safety risks before allowing such devices to...

Obama faces delicate decisions as cyberattack fears rise

August 23, 2012 At the height of the economic crisis in 2008, Saturday Night Live’s “Weekend Update” comedy news show rolled out the character Oscar Rogers as a faux financial commentator. His advice on how to restore the economy? “Fix it! It needs to be fixed! Now!” Four years later, lawmakers are grappling...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.