Nextgov - Authors - Aliya Sternstein Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as <em>National Journal's Technology Daily</em>, <em>Federal Computer Week</em> and <em>Forbes</em>. Before joining <em>Government Executive</em>, Sternstein covered agriculture and derivatives trading for <em>Congressional Quarterly</em>. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.en-usMon, 26 Jan 2015 06:00:00 -0500What Do CENTCOM’s Twitter Hack and GoDaddy Have in Common? Tennessee Valley Authority sites were compromised in 2013, when an adversary broke in through a software flaw.Aliya SternsteinMon, 26 Jan 2015 06:00:00 -0500 screen grab made Monday, Jan. 12, 2015 show the front page of the U.S. Central Command twitter account after is was hacked. APHackers Defile Crayola, Borrow F-35 Designs and Tick off Madonna another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinMon, 26 Jan 2015 06:00:00 -0500 Pablo Hidalgo - Fotos593/Shutterstock.comExperts Say to Expect Action After State of the Union Cyber Shout Out major holdup to passing new cyber legislation remains liability protections for breached companies that share intelligence with the government.Aliya SternsteinWed, 21 Jan 2015 08:08:31 -0500 Barack Obama delivers his State of the Union address to a joint session of Congress on Capitol Hill on Tuesday, Jan. 20, 2015, in Washington(AP Photo/Mandel Ngan, Pool)Who’s Got the Chops to Run a Transatlantic Cyberspy Cell? sustained British-American operation focused on threats to both countries’ networks would be unprecedented.Aliya SternsteinTue, 20 Jan 2015 06:00:00 -0500 Barack Obama listens as British Prime Minister David Cameron speaks during their joint news conference in the White House.Evan Vucci/APSurvey: Government Agencies May be Better than the Private Sector at Responding to Hacks 43 percent of the public sector falls into the "highly sophisticated" security posture segment, according to the 2015 Cisco security report.Aliya SternsteinTue, 20 Jan 2015 00:05:00 -0500 Tim/Shutterstock.comHackers Wage ‘Jihad’ on French Websites, Name Swiss Bank Account Clients and Surveil Pyongyang Newsreaders another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 16 Jan 2015 17:03:22 -0500 of downtown Pyongyang, capital of the North KoreaMaxim Tupikov/Shutterstock.comThis Obamacare Campaign is a Scam warns of a phishing effort purporting to be from the government that aims to steal Obamacare seekers' passwords.Aliya SternsteinThu, 15 Jan 2015 22:35:35 -0500 wk1003mike/Shutterstock.comWatchdog Zeroes in on Supercomputer Supply Chain Risks in Review of NOAA Satellites maintains there will be no involvement by a Chinese company in a project to amp up capacity of supercomputers that generate climate and weather forecasts.Aliya SternsteinThu, 15 Jan 2015 17:02:43 -0500 NOAA satellite image shows Category 2 Hurricane Sandy moving northward across eastern Cuba. NOAA/APObama and Cameron to Chew Over Cross-Border Cyberattacks two leaders are scheduled to discuss a variety of topics, including cybersecurity, over dinner Thursday, followed by a White House meeting Friday.Aliya SternsteinThu, 15 Jan 2015 11:38:24 -0500 President Barack Obama, right, and British Prime Minister David Cameron talk at the start of the plenary session at the G20 Summit in Brisbane, Australia Saturday, Nov. 15, 2014. Kevin Lamarque/APObama Thinks Cyberthreat Sharing is Ready for Comeback Obama administration plans to rewrite a 2011 legislative proposal for collecting information from hacked companies and sharing it across industry -- to alleviate privacy concerns.Aliya SternsteinTue, 13 Jan 2015 18:26:54 -0500 Barack Obama speaks at the National Cybersecurity and Communications Integration Center in Arlington, Va.Evan Vucci/APWhy Doesn’t Obama’s Data Breach Privacy Proposal Apply to Agencies?, there is no law in place requiring hacked agencies to notify citizens when their data is compromised.Aliya SternsteinMon, 12 Jan 2015 20:32:57 -0500 Barack Obama speaks at the Federal Trade Commission offices at the Constitution Center in Washington, Monday, Jan. 12, 2015.Carolyn Kaster/APWhy Police Need to Hack Into CCTV Systems in Paris and Elsewhere good are surveillance cameras populating private and public property worldwide, if emergency responders can’t immediately obtain real-time footage?Aliya SternsteinMon, 12 Jan 2015 06:00:00 -0500 body is wheeled away from a kosher grocery store which was the scene of a hostage taking in Paris, Friday, Jan. 9, 2015. Francois Mori/AP Hackers Rig College Football, Prank Bryan Adams, Target Nvidia and Breach Bus System another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 09 Jan 2015 17:21:04 -0500 running back Brandon Boykin (2) is tackled by Georgia Tech defensive back Jemea Thomas (14) during the first half of an NCAA college football game in 2011.Rich Addicks/APFederal Cybersecurity Spending is Big Bucks. Why Doesn't It Stop Hackers? paying $59 billion for data protections since fiscal 2010, the federal government couldn’t stave off hacks against the White House, State Department, Army and dozens of other agencies.Aliya SternsteinThu, 08 Jan 2015 19:32:07 -0500 Warn: Scrap Proposed $443 Million Border Drone Surge unmanned jets fielded to catch border trespassers have not proved their worth and DHS is lowballing cost estimates, the watchdog reported.Aliya SternsteinTue, 06 Jan 2015 18:50:13 -0500 Eckardt, right, executive director of National Air Security Operations at U.S. Customs and Border Protection, speaks with a Customs and Border Patrol agent prior to a drone aircraft flight.Matt York/APUS Digital Service Hauled in to Shore up White House Security After Hack U.S. Digital Service -- the newly minted federal IT fix-it shop headed by former Google engineer Mikey Dickerson -- has been dispatched to look at shoring up security on the White House networks.Aliya Sternstein and Jack MooreTue, 06 Jan 2015 15:09:23 -0500 Spirit/Shutterstock.comNWS Says 'No Involvement' from China-Owned Unit in IBM Supercomputer Deal National Weather Service will get forecast-boosting supercomputers that will increase processing capacity by almost tenfold.Aliya SternsteinMon, 05 Jan 2015 18:32:38 -0500 DataScience and operations officer Christopher Buonanno monitors data on Hurricane Isaac at the National Weather Service Warning and Forecast Office in North Little Rock, Ark.Danny Johnston/AP File PhotoMedical File Hack Affected Nearly Half a Million Postal Workers a previously reported September cyber intrusion at the U.S. Postal Service, some current and former employees' medical information may also have been exposed, the agency now says.Aliya SternsteinFri, 02 Jan 2015 15:55:17 -0500 Joe delivers mail as it rains in San Bruno Calif., on Thursday, Dec. 11, 2014. Joe has worked for the United States Postal Service for twenty years.Alex Washburn/APThe Cyber Threat in 2015: 10 Twists on Hackers’ Old Tricks wiper attacks to cyber extortionists, here are some "old faves and new twists" feds should be mindful of.Aliya SternsteinWed, 31 Dec 2014 11:27:18 -0500 Sergeev/Shutterstock.comHackers Breach S. Korea Nuke Plants, Look Up JMU Employees, and Con Inmates another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinMon, 29 Dec 2014 08:45:52 -0500 Wasserman/Shutterstock.comWatchdog Says Secret Service Misses the Bar on Cybersecurity department's inability to get its own agency to fall in line could raise questions about the enlargement of Homeland Security's cyber authorities.Aliya SternsteinWed, 24 Dec 2014 07:48:41 -0500 Stuart Productions/ShutterstockThe CIA Has a Problem with Biometric Surveillance same technology that flags terrorists could blow a spy's cover at European airports.Aliya SternsteinMon, 22 Dec 2014 19:02:45 -0500 Tim/Shutterstock.comHackers Wreck Iron Plant Machinery, Spear ICANN Systems and Channel M.C. Hammer another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinMon, 22 Dec 2014 09:39:10 -0500 / Shutterstock.comObama Administration Aims to Create ‘Insider Threat’ Job Specialty to Plug Leaks relatively new discipline blends together the roles of counterintelligence analyst, human resources professional and information security professional.Aliya SternsteinMon, 22 Dec 2014 08:55:21 -0500 creation of insider threat teams was spurred, in part, because of the leaks from ex-NSA contractor Edward SnowdenGil C / Shutterstock.comMost Federal Agencies Wouldn’t Be Able to Bounce Back from a Sony Hack percent of federal agencies lack contingency plans in the event of a cyber emergency.Aliya SternsteinThu, 18 Dec 2014 19:55:53 -0500 movie poster for the movie "The Interview" is displayed outside the AMC Glendora 12 movie theater Wednesday, Dec. 17, 2014, in Glendora, Calif. Damian Dovarganes/AP