Articles about Government : US
Phased migration to the new facility will take 18 months.
California regulator the Department of Business Oversight has refuted claims made by Coinbase that its new bitcoin exchange is regulated.
The FTC's chairwoman argued these advised guidelines would both reassure consumers while helping the Internet of Things realize its full potential.
It wouldn't be another news week if our governments didn't disappoint us in some way or another. The UK seems to be tiring of civil liberties, Russia is tiring of civility, and North Korea is way overdue for its little nap. Plus (no surprise), the Department of Homeland Security is insecure.
A scheme to bring women from around the Middle East and Africa to work with tech firms in the US is opening its doors to a fresh round of participants.
Microsoft handed over data linked to the Charlie Hebdo terrorist attack to the FBI in double-quick time, noting that extra snooping should only happen under certain circumstances.
In response to US sanctions, Apple has begun severing its ties with iOS developers in the peninsula of Crimea.
The United States government is gearing up for digital war, with classified documents leaked by former National Security Agency contractor Edward Snowden published by Germany's Der Spiegel outlining the agency's moves to appropriate foreign attacks for its own use.
A collection of notable security news items for the week ending January 16, 2015. Covers enterprise, controversies, reports and more.
It has been revealed during the trial of alleged Silk Road operator Ross Ulbricht that the CEO of failed bitcoin exchange Mt Gox, Mark Karpeles, had been suspected of being behind the online black market site, according to reports.
The president is pushing for the end of laws that protect larger, established Internet providers from competition, which he says harms the rollout of rural broadband services.
A large, embarrassing, and alarming Federal oversight report has found major problems and grave shortcomings with DHS cybersecurity programs and practices across the board.
A new report assessing the Department of Homeland Security since its formation in 2002 finds mission-critical failures across all five of the DHS sectors, and struggles to prove the DHS is effective.
Ross Ulbricht, the alleged mastermind behind the Silk Road anonymous website, has gone on trial in New York, with government prosecutors calling him a criminal 'kingpin'.
Some countries and cultures have a hatred of our freedoms. Not only do they persecute their own subjects relentlessly, they feel they can reach outside of their own closed societies and attack us. They are wrong. We will not be silenced.
You may think you know how scary government can get, but you ain't seen nothin' yet!
Those who want maximum privacy for their email have a tough time using difficult software. Google is attempting to do better with Gmail, but there's already a decent webmail solution.
At informal infosec conference Security B-Sides SF, former Black Hat General Manager and current Global Strategist for Rapid7 Trey Ford outlined the gaps between hacking and legislation in America.
To celebrate President's Day, we look back at some of the technology that defined each of the U.S. presidents from the mid-20th Century, where the Tech Revolution began.
How much do you love your country? Enough to shop until you drop, choosing just the right gifts? If you're stumped on exactly what to give your favorite nation, we have the answers. Come on in!
The government program generally known as Obamacare is the poster child for poor government IT work. There have been others though.
This article is a companion piece to Marines test giant autonomous headless horsebot, published in ZDNet government.
The U.S. government mass surveillance scandal may be the biggest ongoing story of the year. In this updating timeline, you can explore the full scope of the Edward Snowden leaks, which have implicated the world's most powerful nations in the worldwide spying operation.
The most tech-savvy U.S. president to date, Barack Obama uses the best devices and technology for the job, in and outside of the White House. Here's a look at some of the devices, platforms and technology he uses to carry out his day-to-day presidential duties.
Black Hat USA 2013 vendor area included companies such as Veracode, Booz Allen Hamilton and Microsoft, with creative schwag such as Botnets for Breakfast (cereal) and 'hacker' playing cards.
Leading security conference Black Hat 2013 boasts over 100 talks that include hacking nuclear facilities, rooting SIM cards, OPSEC failures of spies, a keynote from the NSA and more.
During his packed Black Hat USA keynote NSA Director Keith Alexander assured the crowd that the NSA's surveillance programs are lawful interception; attendees did not hesitate to shout "Bullshit."
During the year, we have seen the destruction of SOPA and PIPA but the emergence of CISPA and similar laws around the world, a growing trend in hacks and scams, an explosion in malware, and states committing cyberwarfare on their friends and foes. Here's a run-down of what happened in 2012.
With the election only three weeks away, it's becoming clear that I'm going to need to pick a horse to ride really soon. ZDNet Government's David Gewirtz has been finding himself day-dreaming about the people he'd prefer to vote for, if he were given the chance.
In a light-hearted look at the 2012 presidential campaign, Obama and Romney have become the target of many a meme and satirical video.
At the RSA 2011 Conference, Deputy Secretary of Defense William Lynn talks about a new pilot program that will make it easier for government and the technology industry to work together in the future. Lynn says through the new plan, the Defense Department will be able to incorporate more commercial practices while at the same time technology professionals can learn about the challenges facing the Defense Department.
At a Churchill Club event debating the importance of WikiLeaks in Santa Clara, Peter Thiel, Co-founder of Paypal, talks about the difficulty private companies face when defending public interests. Thiel argues that vague laws grant the government excessive powers against companies and individuals and therefore need to be clarified.
At the RSA Conference in San Francisco, FBI Director Robert Mueller highlights the importance of a coordinated response to cybercrime, encouraging businesses to work more closely with the government. Mueller assures companies that reporting breaches of security and going through the investigative process can be done with minimal disruption, safeguarding privacy, data, and confidentiality.
At the RSA Conference in San Francisco, U.S. Secretary of Homeland Security Janet Napolitano discusses three efforts underway to ensure the security of the nation's cyberinfrastructure. This includes the development of National Cybersecurity Incident Response Plan, which will facilitate a coordinated response to cyberthreats from the federal government, local city and state governments, as well as the private sector
At a press event to announce Apps.gov in Mountain View, Calif., ZDNet senior editor Sam Diaz grabs his FlipCam and asks Google co-founder Sergey Brin how tech policy has changed since the Obama administration has entered the political landscape.
At a Churchill Club event held at the Computer History Museum in Menlo Park, Calif., United States CTO Aneesh Chopra describes President Obama's plan to spur innovation through investment, align the nation's domestic priorities, and upgrade the government's own operations.
At Greentech Media's Green Building Summit at SRI International in Menlo Park, Calif., tech executives discuss the future management of smart-grid technology and whether the balance of power will go toward utility companies, government regulatory agencies or building owners.
At Greentech Media’s Green Building Summit at SRI International in Menlo Park, Calif., Serious Material Chairman Marc Porat discusses the challenges associated with building "green" residential homes. He believes it’s important for the green industry to persuade governments to mandate environmentally sustainable buildings in order to speed up construction.
At RSA in San Francisco, Lt. General Keith Alexander talks about how the NSA is working on methods to secure online networks. He outlines two strategies: working with other nations to create an early warning system, and offering strong technical support within the NSA.
At a Churchill Club event in Santa Clara, Calif., Bill Joy, co-founder of Sun Microsystems and partner at Kleiner Perkins Caufield & Byers, calls on the government to require using alternative fuels to protect biofuel innovators from the cyclical nature of the oil market and to make it easier to invest in wind, solar, and geothermal energy.
Teri Takai, the State of California's CIO, talks to CNET's Dan Farber about overseeing an IT organization with more than 130 CIOs and 10,000 technology workers. She also discusses California's e-government initiatives from going green to managing costs during tough economic times.
Teri Takai, CIO of the State of California, describes the State's 'green' strategy. She says the government is looking at ways to decrease its carbon footprint by implementing more services online which would reduce the need for constituents to drive to State offices.
Teri Takai, CIO of the State of California, discusses how she plans to use collaboration and knowledge sharing tools to help communicate with the federal government on various programs such as homeland security, health care and education.