Nextgov - Authors - Aliya Sternstein Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as <em>National Journal's Technology Daily</em>, <em>Federal Computer Week</em> and <em>Forbes</em>. Before joining <em>Government Executive</em>, Sternstein covered agriculture and derivatives trading for <em>Congressional Quarterly</em>. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.en-usMon, 20 Oct 2014 16:34:20 -0400The Number of Industries Getting Classified Cyberthreat Tips from DHS Has Doubled Since July banking, chemical, water, information technology and transportation sectors all recently joined.Aliya SternsteinMon, 20 Oct 2014 16:34:20 -0400 ‘Sandworm’ NATO, Incite Pakistan-India Cyber-rattling and Save Nude Snapchats another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 17 Oct 2014 16:52:05 -0400 Orders Two-Step IDs to Combat Credit Card Hacks executive order also requires agencies to switch to multifactor authentication to access sites that store citizens' personal information.Aliya SternsteinFri, 17 Oct 2014 15:30:41 -0400 Hamik/Shutterstock.comDo Not Click on That Ebola Vaccine Ad issues alert on contagion-inspired phishing schemes and online fraud.Aliya SternsteinFri, 17 Oct 2014 09:34:55 -0400 Says Government Purchase Cards Not Affected by Hack cards and government customers were not affected by this summer’s bank hack.Aliya SternsteinThu, 16 Oct 2014 16:59:00 -0400 Kurikawa/Shutterstock.comHow Should the Government Respond to JPMorgan Hack? a nation state hacked JPMorgan, that deserves a government response, former top cop said.Aliya SternsteinWed, 15 Oct 2014 10:33:03 -0400 C/Shutterstock.comFBI’s Most Wanted Hackers: A Bingo Buff, Chinese Military Members and a PI for the Brokenhearted them from the keyboard likely won’t dent cybercrime, research indicates.Aliya SternsteinTue, 14 Oct 2014 17:08:12 -0400 Attackers Hacked Critical Manufacturing Firm For Months unnamed manufacturing firm vital to the U.S. economy recently suffered a prolonged hack.Aliya SternsteinFri, 10 Oct 2014 17:21:20 -0400 Cause Schizophrenia, Eavesdrop on Yahoo in China, and Hijack Unemployed People another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 10 Oct 2014 16:55:59 -0400 File PhotoCDC Tracks Cell Phone Location Data to Halt Ebola, the Pentagon is adapting a WMD surveillance system to map the spread of the disease.Aliya SternsteinThu, 09 Oct 2014 18:59:03 -0400 youth under quarantine sits behind a cordon outside his house in Moyamba town on the outskirts of Freetown, Sierra Leone.Michael Duff/APDo We Really Need More Cyber Awareness or Should We Put the Robots in Charge? the answer is making robots responsible for fighting hackers.Aliya SternsteinTue, 07 Oct 2014 16:34:31 -0400 Nivens/Shutterstock.comYes, Sunbathers, That's a Government-Commissioned Drone Above You Coast Guard robot planes would be deployed for public-safety missions.Aliya SternsteinTue, 07 Oct 2014 09:36:44 -0400 TechThese drones can see where you put your sunscreen.Zoom Team/Shutterstock.comShould Feds Be Afraid of a Popular Chinese Chat App?’s U.S. footprint is increasing, despite allegations of spyware.Aliya SternsteinMon, 06 Oct 2014 04:00:00 -0400 Out Sex Offenders, Infect New Country and Breach Security Firm’s Database another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 03 Oct 2014 17:37:53 -0400 No Longer Needs Permission Slips to Monitor Other Agencies' Networks for Vulnerabilities rules published by the Office of Management and Budget require agencies to agree to proactive scanning.Aliya SternsteinFri, 03 Oct 2014 17:34:55 -0400 reflection of the Department of Homeland Security logo in the eyeglasses of a cybersecurity analyst at the watch and warning center of the Department of Homeland Security's secretive cyber defense facility in Idaho Falls, Idaho. Mark J. Terrill/AP File PhotoContractors, Expect 72-hour Rule for Disclosing Corporate Hacks military requires breaches of company systems holding technical data be reported within three days – and so might the rest of the government.Aliya SternsteinMon, 29 Sep 2014 22:11:33 -0400 Wasserman/Shutterstock.comHush-hush Data Firm Palantir Snags ICE Case-Tracking Deal deal is part of an $818 million program to replace a 1980s-era watch-list system.Aliya SternsteinMon, 29 Sep 2014 14:31:50 -0400 DataIn this March 30, 2012 photo, Immigration and Customs Enforcement agents take a suspect into custody.Gregory Bull/AP File PhotoHackers Zero In on Subs, Steal Kentucky Patient Data and Foul Web Developer Site another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 26 Sep 2014 20:44:13 -0400 user Matthew C. WrightForget Supersonic Jets. The Military Needs an Odometer for Computer Chips. could keep out Chinese counterfeit chips from military systemsAliya SternsteinFri, 26 Sep 2014 17:05:29 -0400 Can’t Find Files After Spending $550M to Digitize Them with computerized case-management system leaves less time for investigations, IG says.Aliya SternsteinWed, 24 Sep 2014 17:20:44 -0400 BriefingFling cabinets at FBI headquarters/FBIFBI Plans Rapid DNA Dragnets could collect stop-and-swab genetic records in biometric ID database.Aliya SternsteinTue, 23 Sep 2014 16:50:35 -0400 TechWinfried Rothermel/AP File PhotoCould the Internet Have Prevented $5.2 Billion From Going to IRS Refund Thieves? forms are the culprit in growing tax refund fraud.Aliya SternsteinMon, 22 Sep 2014 16:50:15 -0400 Tkach/Shutterstock.comLess than Half of Feds Say Security Is Key Part of Their Mobile Strategy’s very likely employees are uploading work to Dropbox and without consent.Aliya SternsteinMon, 22 Sep 2014 07:36:55 -0400 Kabakou/Shutterstock.comHackers Compromise iPhone Ads, Go Incognito 12 Years in Europe, and Infect Bloggers another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 19 Sep 2014 17:03:06 -0400 C/Shutterstock.comNCI Seals $41 Million Deal to Support Army Cyber Ops provide NETCOM synchronized and secure information operations for missions.Aliya SternsteinFri, 19 Sep 2014 09:09:26 -0400