Nextgov - Authors - Aliya Sternstein Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as <em>National Journal's Technology Daily</em>, <em>Federal Computer Week</em> and <em>Forbes</em>. Before joining <em>Government Executive</em>, Sternstein covered agriculture and derivatives trading for <em>Congressional Quarterly</em>. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.en-usFri, 27 Mar 2015 17:13:54 -0400Hackers Take on Amazon’s Twitch Gaming Service, Con Car Accident Victims and Cause ‘Deep Shido’ for Judo Club another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 27 Mar 2015 17:13:54 -0400 Trust Overpowered High-Tech Security in German Air Plane Crash say the downing of Germanwings flight 9525 seems like the classic case of the insider threat -- which belies easy tech fixes.Aliya SternsteinThu, 26 Mar 2015 18:22:35 -0400 workers work on debris of the Germanwings jet at the crash site near Seyne-les-Alpes, France, Thursday, March 26, 2015.Laurent Cipriani/APThe Smartest Hackers in the Room (Hint: They're Not the Humans) $2 million “Cyber Grand Challenge” pits hacker-fighting software against malicious code programmed by Pentagon personnel.Aliya SternsteinWed, 25 Mar 2015 17:48:26 -0400 Waited Nearly a Month and a Half to Fix High-Threat Vulnerabilities "anti-phishing" and malware defense reports show the mean time for dealing with "high findings" flagged by vulnerability scans was 42 days.Aliya SternsteinTue, 24 Mar 2015 16:08:55 -0400 Sergeev/Shutterstock.comState Says It Mistakenly Gave Itself an F on Email Security buggy scoring system and self-reporting mistakes are partly to blame for State earning "0" marks on email encryption, officials say.Aliya SternsteinMon, 23 Mar 2015 12:23:18 -0400 Van Scyoc/Shutterstock.comHackers Fleece Sam’s Club, Snoop on Chinese Military Projects, and Poach IDs from Blue Cross, Again another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 20 Mar 2015 16:49:20 -0400 Wolter/Shutterstock.comThis Is How the Military Eyes ISIS Oil Laundering from the Sky watching signs of the black market oil industry, NGA can glean clues to help its partners choke off the source of ISIS' money and fuel.Aliya SternsteinFri, 20 Mar 2015 07:00:00 -0400 from the al-Qaida linked Islamic State of Iraq and the Levant (ISIL) during a parade in Raqqa, Syria.Raqqa Media Center/APIn Nod To Privacy, Feds Say Every Agency Website Will Be Encrypted the "HTTPS-Only Standard" makeover likely won’t happen overnight, privacy proponents cheered the effort.Aliya SternsteinWed, 18 Mar 2015 05:00:00 -0400 Military Cybersecurity by the Numbers for the Cyber Command – tasked with orchestrating network defense maneuvers and offensive cyberattacks – eventually will stabilize over the next five years, totaling out at $1 billion.Aliya SternsteinMon, 16 Mar 2015 15:35:07 -0400 Command chief Adm. Mike RogersAP PhotoUnpaid Suspension of Federal Hydrologist Once Accused of Illegal Army Downloads Is Under Review has dropped charges against the naturalized citizen for stealing sensitive dam records.Aliya SternsteinMon, 16 Mar 2015 09:14:25 -0400 Hoover Dam, as seen from the heliport in Boulder City, Nev.Pablo Martinez Monsivais/APHackers Infiltrate University of Chicago, Violate Privacy of Ex-Wife’s Medical Patients, and Aid Private Eyes another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 13 Mar 2015 15:51:07 -0400 USCIS Computer Was Supposed to Speed Up Immigration Processing. What Went Wrong? online system to automate the processing of Green Cards and other immigration benefits has struggled to function properly since at least 2009Aliya SternsteinFri, 13 Mar 2015 13:40:47 -0400 BriefingChrist ChavezTreasury Begins Automating Cyber Tip-Sharing with Banks technology upgrade follows heavy assaults on Wall Street networks over the past few years.Aliya SternsteinThu, 12 Mar 2015 13:58:08 -0400 Robert McQuade, right, works on the floor of the New York Stock Exchange, Thursday, March 5, 2015.Richard Drew/APPentagon on Path to Launch Hacker-Proof Boeing Drone by 2018 industry programmers are rewriting software on the helicopter drone to prevent outsiders from digitally infiltrating the aerial vehicle.Aliya SternsteinWed, 11 Mar 2015 16:18:53 -0400's unmanned little bird drone.BoeingState Says it Needs to Rebuild Classified Computer Networks after Hack has asked Congress for $10 million to support "the necessary re-architecting of the classified and unclassified networks” at the departmentAliya SternsteinTue, 10 Mar 2015 17:13:40 -0400 Department headquarters.J. Scott Applewhite/AP File PhotoWhy the National Geospatial Intelligence Agency Has Eyes on the Arctic’s focus on the North Pole could allow the agency to go even more open source.Aliya SternsteinMon, 09 Mar 2015 16:07:28 -0400 Director Robert CardilloNational Geospatial-Intelligence AgencyIsis -- No, Not That One -- Wins $7 Million Pentagon Cyber Contract Pentagon has hired a little-known Virginia startup with an unfortunate name to work on a big data project.Aliya SternsteinSun, 08 Mar 2015 21:41:31 -0400 Con Telecom IT Support Worker, Bilk Mandarin Oriental Guests and Trigger Bogus Bomb Alarm at a Mall another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 06 Mar 2015 14:58:21 -0500 Bell/Shutterstock.comAttention, Cyber Pros: The Pentagon Wants You -- 3,000 of You military has been given the go-ahead to fast-track the hiring of 3,000 computer whiz civilians.Aliya SternsteinThu, 05 Mar 2015 17:12:24 -0500 military cyber professionals conduct an exercise during Cyber Flag 13-1, Nov. 8, 2012, at Nellis Air Force Base, Nev. US Air ForceFallout from Clinton’s Private Emails: How Secure are Agency Email Systems? government email accounts are no locked fortresses, and some shirk key federal security regulations.Aliya SternsteinThu, 05 Mar 2015 09:08:38 -0500 Matthews/AP File Photo6 Biggest Blunders in Government's Annual Cyber Report Card White House has released its yearly assessment of agency compliance with the governmentwide cyber laws.Aliya SternsteinMon, 02 Mar 2015 19:03:24 -0500 NivensClapper: Maintaining Phone Call Surveillance is Like Buying Insurance nation's top spy said keeping logs of U.S. citizens' phone calls is a preventive measure for discerning potential threats.Aliya SternsteinMon, 02 Mar 2015 16:33:41 -0500 of National Intelligence James Clapper J. Scott Applewhite/APHackers Cut In Line for Burning Man Tickets, Hack Back Against Lenovo and Scam Illinois Cops another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinMon, 02 Mar 2015 09:45:14 -0500 scene from the 2014 Burning Man festival.Flickr user Gwen SchroederWhite House Cyber Force Has a $140,000 Opening cyber defenders are always on guard. Take that, China.Aliya SternsteinFri, 27 Feb 2015 17:28:12 -0500 Cam/Shutterstock.comAnthem Health Care Hack Snared Federal Employees Who Weren’t Anthem Customers who knows how many?Aliya SternsteinFri, 27 Feb 2015 08:02:38 -0500 Conroy/AP