Nextgov - Authors - Aliya Sternsteinhttp://www.nextgov.comAliya Sternstein reports on cybersecurity and homeland security systems for <em>Nextgov</em>. She has covered technology for nine years at such publications as <em>National Journal's TechnologyDaily</em>, <em>Federal Computer Week</em> and <em>Forbes</em>. Before joining <em>Government Executive</em>, she covered agriculture and derivatives trading for Congressional Quarterly. She has been a guest commentator on C-SPAN, WTOP and Federal News Radio. She is a graduate of the University of Pennsylvania.en-usTue, 22 Apr 2014 07:27:48 -0400Government Employees Cause Nearly 60% of Public Sector Cyber Incidents emails and other errors account for most of the compromised data.Aliya SternsteinTue, 22 Apr 2014 07:27:48 -0400 Nivens/Shutterstock.comDeltek Breach Raises Questions About Widespread Hacking won't confirm company assertions about the attack, which affected 80,000 employees of government contractors.Aliya SternsteinMon, 21 Apr 2014 10:36:48 -0400 Means Users Must Reset Passwords online marketplace's homepage directs users to change their login information.Aliya SternsteinSat, 19 Apr 2014 08:27:50 -0400 Could Virtually Hover Over a Battlefield With Oculus virtual reality headset is ready for action, software exec says.Aliya SternsteinFri, 18 Apr 2014 16:47:04 -0400 TechAttendees play a video game wearing Oculus Rift virtual reality headsets at the Intel booth at the International Consumer Electronics Show in Las Vegas.Jae C. Hong/AP File PhotoHackers Scour Boob Job Records, Identify Anonymous, and Hold Up Nebraska Bank another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 18 Apr 2014 16:38:24 -0400 to Tell If Hackers Are Attacking Your Utility System Through Heartbleed issues bulletin listing 14 hallmarks of a Heartbleed breach.Aliya SternsteinThu, 17 Apr 2014 16:41:37 -0400 Wants to Recycle Its Own Computers thinks it can do a better job than GSAXcess.Aliya SternsteinWed, 16 Apr 2014 16:29:12 -0400 the Cloud to Your Pentagon-Issued Phone Defense Department plans to augment cloud services to work on mobile devices, a Defense Department acquisition manager said.Aliya SternsteinTue, 15 Apr 2014 16:55:33 -0400 Cyber Command Staff Is Harder Than You Think Guard instructs computer whizzes from various educational backgrounds to reach the same proficiency level.Aliya SternsteinMon, 14 Apr 2014 17:56:14 -0400 Wasserman/Shutterstock.comFederal Websites Avoid Heartbleed Risks, DHS Says Akamai systems powering the Obamacare website contained the data-leaking vulnerability.Aliya SternsteinFri, 11 Apr 2014 17:18:33 -0400 the IRS Is Leaving Your Financial Data Unprotected has failed to patch security vulnerabilities that could compromise taxpayer information.Aliya SternsteinWed, 09 Apr 2014 12:47:01 -0400 Trusts Other Agencies’ Cloud Security Judgments is among a handful to rely on FedRAMP certification.Aliya SternsteinTue, 08 Apr 2014 12:49:05 -0400 Facility Security System Implicated in Nun Break-In Now Fixed security system for the Tennessee complex was completed early and for $20 million less than expected.Aliya SternsteinMon, 07 Apr 2014 17:33:33 -0400 of Energy/AP File PhotoDHS Prepares Overhaul of Internal Security Operations wants 'kill chain' to drive the revamp.Aliya SternsteinFri, 04 Apr 2014 15:10:14 -0400 BriefingMark J. Terrill/AP file photoDHS Quietly Delivers Hacker Footprints to Industry little-known firewall-protected website exchanges sensitive cyber intel between companies and agencies.Aliya SternsteinWed, 02 Apr 2014 15:50:10 -0400 Feds Are Still Buying IT That Works With Windows XP the last 12 months, agencies posted nearly 200 solicitations for products compliant with the operating system, which will lose Microsoft's security support on April 8.Aliya SternsteinTue, 01 Apr 2014 08:25:25 -0400 BriefingTed S. Warren/AP file photoDon't Tase Me CBP agency is shopping for stun guns, after guidelines stress limiting deadly force on trespassers.Aliya SternsteinMon, 31 Mar 2014 13:06:09 -0400 Takes a Second Stab at Automating Immigration Casework wins first contract in project's revival, hopes agile software development will make the difference.Aliya SternsteinFri, 28 Mar 2014 16:24:01 -0400 BriefingIllegal immigrant Layios Roberto waits outside the offices of Coalition for Humane Immigrant Rights with application papers in Los Angeles.Nick Ut/AP Military Green Lights Amazon Cloud for Defensewide Use based on FedRAMP tests and additional security controls.Aliya SternsteinWed, 26 Mar 2014 12:25:59 -0400 C / Shutterstock.comSome Agencies Still Using Windows XP Probably Don't Realize It Microsoft stops releasing software patches for the obsolete operating system next month, forgotten networked appliances could pose the biggest opening for hackers to exploit.Aliya SternsteinTue, 25 Mar 2014 17:35:09 -0400 BriefingAdriano Castelli / Shutterstock.comSenators Want Ukraine to Arrest Target Hackers in Exchange for Aid would initiate U.S.-Ukraine talks on cybercrime and institute new extradition procedures.Aliya SternsteinTue, 25 Mar 2014 13:05:43 -0400 "The previous Ukrainian government routinely turned a blind eye to cybercrime,” Sen. Mark Warner, D-Va., said in a statement.J. Scott Applewhite/APMicrosoft Offers Agencies Incentives to Drop Windows XP upgrading to Windows 8 receive discounts and robust Office 365 cloud service.Aliya SternsteinMon, 24 Mar 2014 11:39:57 -0400 BriefingKen Wolter/Shutterstock.comFeds Aren't Worried About Windows XP Vulnerabilities Microsoft retires security support for the operating system in April, agencies will have countermeasures in place.Aliya SternsteinFri, 21 Mar 2014 14:15:18 -0400 S. Warren/AP file photoAdministration Calls for Program to Continously Probe Personnel Navy Yard Shooting, officials want to connect computer systems used for issuing security clearances and ID cards.Aliya SternsteinTue, 18 Mar 2014 15:37:18 -0400 BriefingIn September 2013, Aaron Alexis opened fire in Washington's Navy Yard, killing 12 people and injuring eight others.Jacquelyn Martin/AP DARPA Cyber Ops Needs a Bigger Rolodex seeks private-sector cyber ninjas to help dominate the cyber domain.Aliya SternsteinMon, 17 Mar 2014 15:06:35 -0400 Bailey/