recommended reading

author archives

Results 1-10 of 16

Here’s How Countries Like China, Russia Control Online Dissent

October 6, 2016 In January 2011, protests broke out across Egypt to demand an end to the despotic and repressive regime of Hosni Mubarak. The protests were largely organized online, through social networks like Twitter and Facebook. Mubarak quickly realized this, and launched a counterattack: He severed all access to the internet from...

Here’s How Countries Like China, Russia Control Online Dissent

October 5, 2016 In January 2011, protests broke out across Egypt to demand an end to the despotic and repressive regime of Hosni Mubarak. The protests were largely organized online, through social networks like Twitter and Facebook. Mubarak quickly realized this, and launched a counterattack: He severed all access to the internet from...

Easy Questions Computers Are Terrible at Answering

August 2, 2016 The way artificial intelligence is progressing, you might think a robot takeover of the human race is right around the corner. Artificial brains can now drive cars, do legal research, recognize faces and beat the best human players at games like Go. Prominent technologists keep warning AI poses a fundamental...

Things That Can Be Hacked

May 14, 2016 voicemails a tree or log productivity the mainframe the gibson computers generally a loogie (or is that “hock”?) a trail through the jungle hair Pokémon drywall “it” growth the human body major motion picture studios the planet away at the problem your way around the problem Starbucks iced lattes meat...

How to Create a Supersecure Password You’ll Never Forget: Use Poetry

October 20, 2015 If you’re like most people, your passwords are terrible. You might have just one insecure password that you use for everything. A pair of computational linguists at the University of Southern California have a possible answer to your easy-to-hack habits. They set out (pdf) to automatically generate unique passwords that...

What’s in the Ashley Madison Database Hackers Released Online?

August 19, 2015 The hackers who claimed to have stolen every bit of data from Ashley Madison, a dating website intended for adulterers, have made good on their promise to release the full database if the site didn’t shut down. Identifying themselves as Impact Team, the hackers have made available a frighteningly vast...

The Chinese Military Is Afraid Wearables Will Reveal its Secrets

May 11, 2015 China’s military released an ominous warning on May 10, telling troops and the wider public that network-connected wearable devices pose a national security risk when used by military personnel. Published in the People’s Liberation Army (PLA) Daily—a mouthpiece for the military—the warning outlines the risks (link in Chinese) of all...

China Warns Its Soldiers: Wearable Tech Could Leak Secrets

May 11, 2015 China’s military released an ominous warning on May 10, telling troops and the wider public that network-connected wearable devices pose a national security risk when used by military personnel. Published in the People’s Liberation Army (PLA) Daily—a mouthpiece for the military—the warning outlines the risks (link in Chinese) of all...

Inside China’s Elaborate and Absurd Internet Propaganda Machine

December 18, 2014 “NOTICE: We request every internet commenter carry out the following task today,” begins an email from the supervisor. It’s just another day in the propaganda department of Zhanggong, a district in southeast China’s modestly sized city of Ganzhou. Employees and freelancers are paid to post pro-government messages on the internet,...

Still Think Robots Can’t Do Your Job? This Video May Change Your Mind

August 15, 2014 It’s hard to grasp the scale of the robot revolution that is slowly eating away at the human workforce. A new video by CGP Grey, a Youtube user who makes short explanatory videos, helps put things in perspective. The 15-minute video, “Humans Need Not Apply,” focuses on jobs once thought...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.