recommended reading

author archives

Results 1-10 of 229

Interior Department IT Manager Admits to Credit Card Fraud

May 25, 2017 An IT manager in the Interior Department chief information officer’s office has admitted making more than $3,500 in personal charges on her government credit card, Interior’s inspector general said Thursday. The IT manager, Tracy Hamm, pleaded guilty to misdemeanor credit card fraud in Superior Court of the District of Columbia...

The Bumps, Cuts and Zeros in Trump’s Tech Budget

May 23, 2017 President Donald Trump’s proposed budget boosts spending on federal IT and cybersecurity programs, with an emphasis on more modern, secure systems and data-driven management. “Modernization, in this sense, is not simply replacing individual outdated IT systems with newer ones; rather, it is a holistic approach to federal IT that fundamentally...

Hackers Launch Hack-of-the-Month Club, Target DocuSign Users and Food Ordering Service

May 22, 2017 In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Phishing Campaign Targets Electronic Signature Service DocuSign Users DocuSign, an electronic signature service, warned of a convincing phishing campaign targeting its users. Since May 9, DocuSign had been tracking an increase in phishing...

Congress Questions Software Bug Hoarding, WannaCry Patches and Modern Pirates

May 19, 2017 Congressional efforts to update and generally catch federal IT up with the times moved along this week, including a bill that could change the way the government determines whether it should use software bugs for spying. The big one, the Modernizing Government Technology Act, easily passed the House Wednesday and...

Hackers Antagonize Universities, Create Trojans and Find 'Crazy Bad' Zero Day

May 15, 2017 In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Cyberattacks on Singapore Universities Not 'Work of Casual Hackers' A couple of Singaporean higher-education institutions suffered separate cyberattacks in April, and officials say it wasn’t “the work of casual hackers.” The National University...

Hill Leaders: You Need Us to Make the Cyber Executive Order Work

May 12, 2017 Editor's Note: This article was updated to note the Senate committee would hold a markup Wednesday. Hill cyber leaders generally praised President Donald Trump’s cybersecurity executive order, which dropped Thursday afternoon, but stressed Congress’ role in ensuring successful implementation of the order’s directives to protect government and critical infrastructure systems....

Hackers Target Travel Bookings System, Phish Google Users and Demand Ransom for Netflix Show

May 8, 2017 In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Travel Tech Company Sabre Reports Possible Bookings System Breach Sabre Corp., a travel technology company, disclosed an investigation into a potential breach of its reservation system that supports about 32,000 hotels. The company...

Get Ready for Another Net Neutrality Rumble

May 5, 2017 At least one of the recent biggest issues on the Hill sunset: President Donald Trump on Friday signed the omnibus spending bill to keep the government funded through September. But another is brewing. This week, a group of senators jumped into Federal Communications Commission Commissioner Ajit Pai’s mission to roll...

MGT Act, FAFSA Data Breach on Congress' Agenda

May 1, 2017 Congress averted a government shutdown Friday with a short-term spending bill and this week, legislators aim to vote on a bipartisan deal that would fund the government through September. Lawmakers are also gearing up for another Affordable Care Act fight, but the federal tech community will watch the House Oversight...

Hackers Expose Gamers' Accounts and Meddle in French Elections

May 1, 2017 Stay in the know. Follow ThreatWatch, Nextgov's index of data breaches and cyber threats. Wireless Heart Monitor Maker to Pay $2.5M Settlement to HHS After Laptop Stolen CardioNet, a remote mobile cardiac monitoring company, agreed to pay a $2.5 million settlement after an employee’s laptop with protected health information was...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.