recommended reading

author archives

Results 1-10 of 337

A Bot That Identifies 'Toxic' Comments Online

9:00 AM ET Civil conversation in the comment sections of news sites can be hard to come by these days. Whatever intelligent observations do lurk there are often drowned out by obscenities, ad-hominem attacks, and off-topic rants. Some sites, like the one you’re reading, hide the comments section behind a link at the...

Why Some Apps Use Fake Progress Bars

February 21, 2017 In a fit of productivity, I did my taxes early this year. They were a bit more complex than usual, so I set aside some time to click through TurboTax and make sure I got everything right. Throughout the process, the online tax-preparation program repeatedly reassured me it had helped...

The Risks of Sending Secret Messages in the White House

February 15, 2017 By some accounts, the deluge of leaks detailing the hurdles and setbacks that have troubled the first weeks of the Trump administration have provoked panic among its highest ranks—and prompted top officials to try to identify the leaky staffers. President Trump has tweeted his dismay at the leaks several times,...

A NASA Engineer Was Required to Unlock his Phone at the Border

February 13, 2017 Everything started to go wrong just after 5 a.m., when Sidd Bikkannavar scanned his passport, placed his hand on a fingerprint reader, and watched as the automated customs kiosk spat out a receipt with a black X drawn across it. It was January 31. Bikkannavar had just arrived at Houston’s...

from govexec

A NASA Engineer Was Required to Unlock his Phone at the Border

February 13, 2017 Everything started to go wrong just after 5 a.m., when Sidd Bikkannavar scanned his passport, placed his hand on a fingerprint reader, and watched as the automated customs kiosk spat out a receipt with a black X drawn across it. It was January 31. Bikkannavar had just arrived at Houston’s...

'Give Us Your Passwords'

February 10, 2017 “What sites do you visit? And give us your passwords.” That’s what U.S. Homeland Security Secretary John Kelly wants foreign visitors to hear before they’re allowed to enter the United States. “If they don’t want to give us that information, then they don’t come,” he said, while testifying in front...

from govexec

What Happens if Border Agents Are Allowed to Demand Access to Your Phone and Online Accounts?

February 10, 2017 “What sites do you visit? And give us your passwords.” That’s what U.S. Homeland Security Secretary John Kelly wants foreign visitors to hear before they’re allowed to enter the United States. “If they don’t want to give us that information, then they don’t come,” he said, while testifying in front...

Mapping Countries That Censor the Internet

February 9, 2017 If you’re having trouble with your internet connection, one of the first things tech support will ask you to do is to run a speed test. There are dozens of websites and apps that will, at the tap of a button, measure your network speed—but they can’t tell you which...

from govexec

What Happened to Trump’s Secret Hacking Intel?

February 7, 2017 Hours before the new year, Donald Trump—then still the president-elect—was speaking to a few reporters outside Mar-a-Lago, his private club in Palm Beach, Florida. He was telling them about his doubts that the intelligence community would perform an accurate investigation into the cyberattacks that targeted Democrats in the months leading...

Your Browsing History Alone Can Give Away Your Identity

February 6, 2017 Advertisers would give just about anything to be able to lurk over your shoulder as you browse the internet. They want to know what sites you visit, how you get to them, how long you spend on them, and where you go next—along with as much personal information about you...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.