recommended reading

author archives

Results 1-10 of 366

Hackers Get Back to the Basics

April 28, 2017 For the past month, WikiLeaks has regularly released secret CIA documents that reveal the breadth of the agency’s hacking tools. Some seem lifted straight from a spy thriller, like a tool that can turn internet-connected TVs into covert listening devices. The same could be said for complex state-on-state cyberattacks, like...

A Trick That Hides Censored Websites Inside Cat Videos

April 26, 2017 A pair of researchers behind a system for avoiding internet censorship wants to deliver banned websites inside of cat videos. Their system uses media from popular, innocuous websites the way a high schooler might use the dust jacket of a textbook to hide the fact that he’s reading a comic...

Chatbots Have Entered the Uncanny Valley

April 21, 2017 When a robot almost looks human—almost, but not quite—it often comes across as jarringly fake instead of familiar. Robots that are clearly artificial, like WALL-E or R2-D2, don’t have this problem. But androids like this one that imperfectly mimic human mannerisms and facial expressions are weird enough to be haunting....

The Dark Side of Slack’s New Emoji Statuses

April 18, 2017 Last week, emoji continued their unstoppable invasion into Slack. They began popping up alongside my coworkers’ names in the popular messenger-app’s interface: First, it was just a few early adopters, who were just trying one on for size—I chose a contemplative —but soon, they were everywhere. The proliferation was the...

The Steady Rise of Digital Border Searches

April 12, 2017 New statistics released Tuesday by U.S. Customs and Border Protection reveal that the rate of digital border searches is on pace to quadruple since 2015. That means more and more travelers entering the U.S. are being asked to turn over their electronic devices to be analyzed. The increase appears to...

from govexec

The Steady Rise of Digital Border Searches

April 12, 2017 New statistics released Tuesday by U.S. Customs and Border Protection reveal that the rate of digital border searches is on pace to quadruple since 2015. That means more and more travelers entering the U.S. are being asked to turn over their electronic devices to be analyzed. The increase appears to...

The Steady Rise of Digital Border Searches

April 12, 2017 New statistics released Tuesday by U.S. Customs and Border Protection reveal the rate of digital border searches is on pace to quadruple since 2015. That means more and more travelers entering the U.S. are being asked to turn over their electronic devices to be analyzed. The increase appears to have...

An Algorithm That Hides Your Online Tracks With Random Footsteps

April 11, 2017 Last week, President Donald Trump signed a controversial new law, allowing internet providers to continue gathering sensitive information on their users and selling that data to advertisers. News sites erupted with recommendations for keeping browsing history private—but because all the data people send and receive online goes through their service...

When Apps Secretly Team Up to Steal Your Data

April 7, 2017 Imagine two employees at a large bank: an analyst who handles sensitive financial information and a courier who makes deliveries outside the company. As they go about their day, they look like they’re doing what they’re supposed to do. The analyst is analyzing; the delivery person is delivering. But they’re...

CSI: Walmart

April 4, 2017 A highly secured digital-forensics laboratory sits tucked inside an enormous complex of low, boxy buildings in Bentonville, Arkansas. To get in, analysts have to scan their hands and enter a unique password. Inside, they comb through video-surveillance records and spirit data out of devices that have seen better days, like...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.