recommended reading

author archives

Results 1-10 of 342

The US Needs to Whip Its Disaster-Response Plans Into Shape

March 1, 2016 When the 2010 earthquake in Haiti proved too much for the United Nations’ humanitarian aid workers, the U.S. government took over, mounting a relief operation that was ultimately deemed fairly successful. But six years after that response, the federal government has yet to fully institutionalize the lessons it gleaned, or...

Here’s One Way the US-China Relationship Is Improving

August 4, 2015 There’s plenty of friction between the U.S. and China these days, but at least one aspect of the relationship hasn’t been this strong since the 20th century. Military-to-military contacts — from low-level exercises all the way up to presidential and four-star visits — have been shooting up since 2010, and...

An Unexpected Voice Speaks Out Against Backdoored Encryption

July 27, 2015 ASPEN, Colo. — As top national-security officials continued to argue that U.S. companies should build government-only backdoors into encrypted devices and services, an unexpected voice rose in opposition. “I think that it’s a mistake to require companies that are making hardware and software to build a duplicate key or a...

Former Pentagon Intel Chief Says Military’s Clandestine Service Is Growing

July 23, 2015 ASPEN, Colo. — A military human intelligence organization that has faced headwinds in recent years is still growing in size, the Pentagon’s former intelligence chief said on Thursday. Michael Vickers, until recently the undersecretary of defense for intelligence, said that the Defense Clandestine Service is still expanding and will continue...

NATO Members’ Defense Spending, in Two Charts

June 22, 2015 Five NATO members are expected to meet the alliance’s 2 percent target for defense spending in 2015, according to data released on Monday. Poland joins Britain, Estonia, Greece, and the United States as the only members of the 28-country alliance to meet the threshold. NATO Secretary General Jens Stoltenberg commended...

How the Air Campaign Against ISIS Is Changing, in Three Charts

May 14, 2015 The air forces hitting ISIS militants in Iraq and Syria are increasingly going after smaller targets, a reflection of previous successes—and enemy adaptation. In the past month, roughly 44 percent of air-strike targets have been towards ISIS fighting positions. That’s up from about 20 percent overall since the campaign began...

from govexec

Three Charts That Explain the ISIS Targets Struck By Coalition Air Forces

April 7, 2015 The U.S. military’s share of the air campaign against ISIS is holding steady. In both February and March, American forces carried out about 70 percent of the coalition’s air attacks against targets in Iraq and 93 percent of them in Syria, according to figures released today by CENTCOM officials. Since...

The 5,548 ISIS Targets Struck By Coalition Air Forces, in 3 Charts

April 6, 2015 The U.S. military’s share of the air campaign against ISIS is holding steady. In both February and March, American forces carried out about 70 percent of the coalition’s air attacks against targets in Iraq and 93 percent of them in Syria, according to figures released today by CENTCOM officials. Since...

How the White House and Congress Plan To Boost Defense: Ignore Sequestration

March 21, 2015 The House and the Senate may have found a sweet spot for their budget strategies: they’re both planning on using the U.S. war chest to give the Pentagon the money the White House requested for defense, but outside the reach of sequestration’s spending caps. The White House hoped to force...

5 Months of Air Strikes in Iraq and Syria in 4 Charts

January 8, 2015 This story has been updated. It’s been five months since operations began in Iraq to protect the besieged Yazidi population on Mount Sinjar. Since Aug. 8, U.S. and coalition forces have carried out 1,689 strikes in Iraq and Syria against more than 3,200 Islamic State targets (also known as ISIS,...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.