recommended reading

author archives

Results 1-10 of 325

The Demon Voice That Can Control Your Smartphone

January 23, 2017 Here’s a fun experiment: Next time you’re on a crowded bus, loudly announce, “Hey Siri! Text mom, ‘I'm pregnant.’” Chances are, you’ll get some horrified looks as your voice awakens iPhones in nearby commuters’ pockets and bags. They’ll dive for their phones to cancel your command. But what if there...

from govexec

Why Elections Are Now Classified as 'Critical Infrastructure'

January 13, 2017 Last Friday, the same day three of the top spy agencies in the U.S. released a summary of an investigation into Russia’s role in cyberattacks before the election, the Department of Homeland Security made a move that attracted less attention: It classified the elections process as “critical infrastructure,” putting it...

Why Is Obama Expanding Surveillance Powers Right Before He Leaves Office?

January 13, 2017 On Thursday, the Obama administration finalized new rules that allow the National Security Agency to share information it gleans from its vast international surveillance apparatus with the 16 other agencies that make up the U.S. intelligence community. With the new changes, which were long in the works, those agencies can...

from govexec

Why Is Obama Expanding Surveillance Powers Right Before He Leaves Office?

January 13, 2017 On Thursday, the Obama administration finalized new rules that allow the National Security Agency to share information it gleans from its vast international surveillance apparatus with the 16 other agencies that make up the U.S. intelligence community. With the new changes, which were long in the works, those agencies can...

Why Is Obama Expanding Surveillance Powers Right Before He Leaves Office?

January 13, 2017 On Thursday, the Obama administration finalized new rules that allow the National Security Agency to share information it gleans from its vast international surveillance apparatus with the 16 other agencies that make up the U.S. intelligence community. With the new changes, which were long in the works, those agencies can...

Trump’s Cyber-Appeasement Policy Might Encourage More Hacks

January 12, 2017 Since well before he was elected president, Donald Trump has been casting doubt on the accuracy and integrity of investigations that assign blame for cyberattacks. His statements have created an atmosphere of mistrust around forensic analyses, like the one focused on Russia that three top spy agencies briefed him on...

Trump’s Cyber-Appeasement Policy Might Encourage More Hacks

January 10, 2017 Since well before he was elected president, Donald Trump has been casting doubt on the accuracy and integrity of investigations that assign blame for cyberattacks. His statements have created an atmosphere of mistrust around forensic analyses, like the one focused on Russia three top spy agencies briefed him on last...

This is the Hacking Investigation Trump Wants Instead

January 9, 2017 President-elect Donald Trump wants to get to the bottom of news reports that revealed intelligence agencies had intercepted chatter among Russian government officials celebrating Trump’s election. But although he was scheduled to get briefed on the matter on Friday, he doesn’t seem very interested in the intelligence itself. Instead, he...

Why Bosses Can Track Their Employees 24/7

January 6, 2017 Suppose you’re being followed. Someone’s tracking your phone, or has placed a GPS device on your car. They know if you’re at home, or a pregnancy clinic, or church, or a gay bar. Depending on who’s tracking you, this could be a violation of your fundamental constitutional rights—or it could...

Don't Read Too Much Into Vermont Hack Debacle

January 3, 2017 On Friday evening, The Washington Post reported hackers affiliated with the Russian government had penetrated the United States electric grid by attacking a utility company in Vermont. The story was originally illustrated with an image of the headquarters of a Russian spy agency, which it alleged was behind the intrusion....

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.