Nextgov - Authors - Aliya Sternsteinhttp://www.nextgov.com/voices/aliya-sternstein/2337/Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as <em>National Journal's Technology Daily</em>, <em>Federal Computer Week</em> and <em>Forbes</em>. Before joining <em>Government Executive</em>, Sternstein covered agriculture and derivatives trading for <em>Congressional Quarterly</em>. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.en-usMon, 26 Jan 2015 06:00:00 -0500What Do CENTCOM’s Twitter Hack and GoDaddy Have in Common? http://www.nextgov.com/cybersecurity/2015/01/what-do-godaddy-and-centcoms-twitter-have-common/103635/Two Tennessee Valley Authority sites were compromised in 2013, when an adversary broke in through a software flaw.Aliya SternsteinMon, 26 Jan 2015 06:00:00 -0500http://www.nextgov.com/cybersecurity/2015/01/what-do-godaddy-and-centcoms-twitter-have-common/103635/CybersecurityThis screen grab made Monday, Jan. 12, 2015 show the front page of the U.S. Central Command twitter account after is was hacked. APHackers Defile Crayola, Borrow F-35 Designs and Tick off Madonnahttp://www.nextgov.com/cybersecurity/2015/01/hackers-defile-crayola-borrow-f-35-designs-and-tick-madonna/103638/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinMon, 26 Jan 2015 06:00:00 -0500http://www.nextgov.com/cybersecurity/2015/01/hackers-defile-crayola-borrow-f-35-designs-and-tick-madonna/103638/Cybersecurity Pablo Hidalgo - Fotos593/Shutterstock.comExperts Say to Expect Action After State of the Union Cyber Shout Outhttp://www.nextgov.com/cybersecurity/2015/01/experts-say-expect-action-after-state-union-cyber-shout-out/103323/The major holdup to passing new cyber legislation remains liability protections for breached companies that share intelligence with the government.Aliya SternsteinWed, 21 Jan 2015 08:08:31 -0500http://www.nextgov.com/cybersecurity/2015/01/experts-say-expect-action-after-state-union-cyber-shout-out/103323/CybersecurityPresident Barack Obama delivers his State of the Union address to a joint session of Congress on Capitol Hill on Tuesday, Jan. 20, 2015, in Washington(AP Photo/Mandel Ngan, Pool)Who’s Got the Chops to Run a Transatlantic Cyberspy Cell?http://www.nextgov.com/cybersecurity/2015/01/whos-got-chops-run-transatlantic-cyberspy-cell/103182/A sustained British-American operation focused on threats to both countries’ networks would be unprecedented.Aliya SternsteinTue, 20 Jan 2015 06:00:00 -0500http://www.nextgov.com/cybersecurity/2015/01/whos-got-chops-run-transatlantic-cyberspy-cell/103182/CybersecurityPresident Barack Obama listens as British Prime Minister David Cameron speaks during their joint news conference in the White House.Evan Vucci/APSurvey: Government Agencies May be Better than the Private Sector at Responding to Hackshttp://www.nextgov.com/cybersecurity/2015/01/survey-governments-getting-hacked-private-sector/103185/About 43 percent of the public sector falls into the "highly sophisticated" security posture segment, according to the 2015 Cisco security report.Aliya SternsteinTue, 20 Jan 2015 00:05:00 -0500http://www.nextgov.com/cybersecurity/2015/01/survey-governments-getting-hacked-private-sector/103185/CybersecurityJulia Tim/Shutterstock.comHackers Wage ‘Jihad’ on French Websites, Name Swiss Bank Account Clients and Surveil Pyongyang Newsreadershttp://www.nextgov.com/cybersecurity/2015/01/hackers-wage-jihad-french-websites-name-swiss-bank-account-clients-and-surveil-pyongyang-newsreaders/103167/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 16 Jan 2015 17:03:22 -0500http://www.nextgov.com/cybersecurity/2015/01/hackers-wage-jihad-french-websites-name-swiss-bank-account-clients-and-surveil-pyongyang-newsreaders/103167/CybersecurityView of downtown Pyongyang, capital of the North KoreaMaxim Tupikov/Shutterstock.comThis Obamacare Campaign is a Scamhttp://www.nextgov.com/cybersecurity/2015/01/dhs-warns-obamacare-campaign-scam/103062/US-CERT warns of a phishing effort purporting to be from the government that aims to steal Obamacare seekers' passwords.Aliya SternsteinThu, 15 Jan 2015 22:35:35 -0500http://www.nextgov.com/cybersecurity/2015/01/dhs-warns-obamacare-campaign-scam/103062/Cybersecurity wk1003mike/Shutterstock.comWatchdog Zeroes in on Supercomputer Supply Chain Risks in Review of NOAA Satellites http://www.nextgov.com/cybersecurity/2015/01/watchdog-zeroes-supercomputer-supply-chain-risks-review-noaa-satellites/103044/NOAA maintains there will be no involvement by a Chinese company in a project to amp up capacity of supercomputers that generate climate and weather forecasts.Aliya SternsteinThu, 15 Jan 2015 17:02:43 -0500http://www.nextgov.com/cybersecurity/2015/01/watchdog-zeroes-supercomputer-supply-chain-risks-review-noaa-satellites/103044/CybersecurityThis NOAA satellite image shows Category 2 Hurricane Sandy moving northward across eastern Cuba. NOAA/APObama and Cameron to Chew Over Cross-Border Cyberattackshttp://www.nextgov.com/cybersecurity/2015/01/cameron-and-obama-hash-out-cyber-attribution/102954/The two leaders are scheduled to discuss a variety of topics, including cybersecurity, over dinner Thursday, followed by a White House meeting Friday.Aliya SternsteinThu, 15 Jan 2015 11:38:24 -0500http://www.nextgov.com/cybersecurity/2015/01/cameron-and-obama-hash-out-cyber-attribution/102954/CybersecurityU.S. President Barack Obama, right, and British Prime Minister David Cameron talk at the start of the plenary session at the G20 Summit in Brisbane, Australia Saturday, Nov. 15, 2014. Kevin Lamarque/APObama Thinks Cyberthreat Sharing is Ready for Comebackhttp://www.nextgov.com/cybersecurity/2015/01/obama-thinks-cyberthreat-sharing-ready-comeback/102810/The Obama administration plans to rewrite a 2011 legislative proposal for collecting information from hacked companies and sharing it across industry -- to alleviate privacy concerns.Aliya SternsteinTue, 13 Jan 2015 18:26:54 -0500http://www.nextgov.com/cybersecurity/2015/01/obama-thinks-cyberthreat-sharing-ready-comeback/102810/CybersecurityPresident Barack Obama speaks at the National Cybersecurity and Communications Integration Center in Arlington, Va.Evan Vucci/APWhy Doesn’t Obama’s Data Breach Privacy Proposal Apply to Agencies?http://www.nextgov.com/cybersecurity/2015/01/why-doesnt-obamas-data-breach-privacy-proposal-apply-agencies/102720/Currently, there is no law in place requiring hacked agencies to notify citizens when their data is compromised.Aliya SternsteinMon, 12 Jan 2015 20:32:57 -0500http://www.nextgov.com/cybersecurity/2015/01/why-doesnt-obamas-data-breach-privacy-proposal-apply-agencies/102720/CybersecurityPresident Barack Obama speaks at the Federal Trade Commission offices at the Constitution Center in Washington, Monday, Jan. 12, 2015.Carolyn Kaster/APWhy Police Need to Hack Into CCTV Systems in Paris and Elsewherehttp://www.nextgov.com/cybersecurity/2015/01/why-police-need-hack-cctv-systems-paris-and-elsewhere/102612/What good are surveillance cameras populating private and public property worldwide, if emergency responders can’t immediately obtain real-time footage?Aliya SternsteinMon, 12 Jan 2015 06:00:00 -0500http://www.nextgov.com/cybersecurity/2015/01/why-police-need-hack-cctv-systems-paris-and-elsewhere/102612/CybersecurityA body is wheeled away from a kosher grocery store which was the scene of a hostage taking in Paris, Friday, Jan. 9, 2015. Francois Mori/AP Hackers Rig College Football, Prank Bryan Adams, Target Nvidia and Breach Bus Systemhttp://www.nextgov.com/cybersecurity/2015/01/hackers-rig-college-football-prank-bryan-adams-target-nvidia-and-breach-bus-system/102600/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 09 Jan 2015 17:21:04 -0500http://www.nextgov.com/cybersecurity/2015/01/hackers-rig-college-football-prank-bryan-adams-target-nvidia-and-breach-bus-system/102600/CybersecurityGeorgia running back Brandon Boykin (2) is tackled by Georgia Tech defensive back Jemea Thomas (14) during the first half of an NCAA college football game in 2011.Rich Addicks/APFederal Cybersecurity Spending is Big Bucks. Why Doesn't It Stop Hackers?http://www.nextgov.com/cybersecurity/2015/01/has-spending-nearly-60-billion-federal-cybersecurity-stopped-hackers/102534/Despite paying $59 billion for data protections since fiscal 2010, the federal government couldn’t stave off hacks against the White House, State Department, Army and dozens of other agencies.Aliya SternsteinThu, 08 Jan 2015 19:32:07 -0500http://www.nextgov.com/cybersecurity/2015/01/has-spending-nearly-60-billion-federal-cybersecurity-stopped-hackers/102534/CybersecurityHermin/Shutterstock.comInspectors Warn: Scrap Proposed $443 Million Border Drone Surge http://www.nextgov.com/defense/2015/01/inspectors-warn-scrap-proposed-443-million-border-drone-surge/102354/U.S. unmanned jets fielded to catch border trespassers have not proved their worth and DHS is lowballing cost estimates, the watchdog reported.Aliya SternsteinTue, 06 Jan 2015 18:50:13 -0500http://www.nextgov.com/defense/2015/01/inspectors-warn-scrap-proposed-443-million-border-drone-surge/102354/DefenseLothar Eckardt, right, executive director of National Air Security Operations at U.S. Customs and Border Protection, speaks with a Customs and Border Patrol agent prior to a drone aircraft flight.Matt York/APUS Digital Service Hauled in to Shore up White House Security After Hackhttp://www.nextgov.com/cybersecurity/2015/01/us-digital-service-hauled-shore-white-house-security-after-hack/102324/The U.S. Digital Service -- the newly minted federal IT fix-it shop headed by former Google engineer Mikey Dickerson -- has been dispatched to look at shoring up security on the White House networks.Aliya Sternstein and Jack MooreTue, 06 Jan 2015 15:09:23 -0500http://www.nextgov.com/cybersecurity/2015/01/us-digital-service-hauled-shore-white-house-security-after-hack/102324/CybersecurityAmerican Spirit/Shutterstock.comNWS Says 'No Involvement' from China-Owned Unit in IBM Supercomputer Dealhttp://www.nextgov.com/big-data/2015/01/nws-says-no-involvement-china-owned-unit-ibm-supercomputer-deal/102237/The National Weather Service will get forecast-boosting supercomputers that will increase processing capacity by almost tenfold.Aliya SternsteinMon, 05 Jan 2015 18:32:38 -0500http://www.nextgov.com/big-data/2015/01/nws-says-no-involvement-china-owned-unit-ibm-supercomputer-deal/102237/Big DataScience and operations officer Christopher Buonanno monitors data on Hurricane Isaac at the National Weather Service Warning and Forecast Office in North Little Rock, Ark.Danny Johnston/AP File PhotoMedical File Hack Affected Nearly Half a Million Postal Workershttp://www.nextgov.com/cybersecurity/2015/01/medical-file-hack-affected-nearly-half-million-postal-workers/102144/During a previously reported September cyber intrusion at the U.S. Postal Service, some current and former employees' medical information may also have been exposed, the agency now says.Aliya SternsteinFri, 02 Jan 2015 15:55:17 -0500http://www.nextgov.com/cybersecurity/2015/01/medical-file-hack-affected-nearly-half-million-postal-workers/102144/CybersecurityDanny Joe delivers mail as it rains in San Bruno Calif., on Thursday, Dec. 11, 2014. Joe has worked for the United States Postal Service for twenty years.Alex Washburn/APThe Cyber Threat in 2015: 10 Twists on Hackers’ Old Trickshttp://www.nextgov.com/cybersecurity/2014/12/here-are-10-twists-favorite-hacker-tricks-watch-2015/102081/From wiper attacks to cyber extortionists, here are some "old faves and new twists" feds should be mindful of.Aliya SternsteinWed, 31 Dec 2014 11:27:18 -0500http://www.nextgov.com/cybersecurity/2014/12/here-are-10-twists-favorite-hacker-tricks-watch-2015/102081/CybersecurityEugene Sergeev/Shutterstock.comHackers Breach S. Korea Nuke Plants, Look Up JMU Employees, and Con Inmateshttp://www.nextgov.com/cybersecurity/2014/12/hackers-breach-s-korea-nuke-plants-look-jmu-employees-and-con-inmates/102012/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinMon, 29 Dec 2014 08:45:52 -0500http://www.nextgov.com/cybersecurity/2014/12/hackers-breach-s-korea-nuke-plants-look-jmu-employees-and-con-inmates/102012/CybersecurityJeff Wasserman/Shutterstock.comWatchdog Says Secret Service Misses the Bar on Cybersecurityhttp://www.nextgov.com/cybersecurity/2014/12/secret-service-misses-bar-cybersecurity/101979/The department's inability to get its own agency to fall in line could raise questions about the enlargement of Homeland Security's cyber authorities.Aliya SternsteinWed, 24 Dec 2014 07:48:41 -0500http://www.nextgov.com/cybersecurity/2014/12/secret-service-misses-bar-cybersecurity/101979/CybersecurityDavid Stuart Productions/ShutterstockThe CIA Has a Problem with Biometric Surveillancehttp://www.nextgov.com/defense/2014/12/cia-has-problem-biometric-surveillance/101886/The same technology that flags terrorists could blow a spy's cover at European airports.Aliya SternsteinMon, 22 Dec 2014 19:02:45 -0500http://www.nextgov.com/defense/2014/12/cia-has-problem-biometric-surveillance/101886/DefenseJulia Tim/Shutterstock.comHackers Wreck Iron Plant Machinery, Spear ICANN Systems and Channel M.C. Hammerhttp://www.nextgov.com/cybersecurity/2014/12/hackers-wreck-iron-plant-machinery-spear-icann-systems-and-channel-mc-hammer/101784/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinMon, 22 Dec 2014 09:39:10 -0500http://www.nextgov.com/cybersecurity/2014/12/hackers-wreck-iron-plant-machinery-spear-icann-systems-and-channel-mc-hammer/101784/Cybersecurity360b / Shutterstock.comObama Administration Aims to Create ‘Insider Threat’ Job Specialty to Plug Leakshttp://www.nextgov.com/cybersecurity/2014/12/administrations-plan-stopping-leaks-includes-boosting-insider-threat-teams/101763/The relatively new discipline blends together the roles of counterintelligence analyst, human resources professional and information security professional.Aliya SternsteinMon, 22 Dec 2014 08:55:21 -0500http://www.nextgov.com/cybersecurity/2014/12/administrations-plan-stopping-leaks-includes-boosting-insider-threat-teams/101763/CybersecurityThe creation of insider threat teams was spurred, in part, because of the leaks from ex-NSA contractor Edward SnowdenGil C / Shutterstock.comMost Federal Agencies Wouldn’t Be Able to Bounce Back from a Sony Hackhttp://www.nextgov.com/cybersecurity/2014/12/most-agencies-wouldnt-be-able-bounce-back-sony-hack/101658/60 percent of federal agencies lack contingency plans in the event of a cyber emergency.Aliya SternsteinThu, 18 Dec 2014 19:55:53 -0500http://www.nextgov.com/cybersecurity/2014/12/most-agencies-wouldnt-be-able-bounce-back-sony-hack/101658/CybersecurityA movie poster for the movie "The Interview" is displayed outside the AMC Glendora 12 movie theater Wednesday, Dec. 17, 2014, in Glendora, Calif. Damian Dovarganes/AP