recommended reading

author archives

Aliya Sternstein

Senior Correspondent

Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.

Results 1521-1530 of 2710

GAO: Federal network security breaches spike 650 percent

October 3, 2011 Reports of network security incidents at federal agencies have soared 650 percent during the past half-decade, jeopardizing the confidentiality and integrity of sensitive government information, federal auditors charged in a congressionally mandated report. The most prevalent types of cyber events included infections from malicious code -- 30 percent of incidents;...

from govexec

Emerging Leaders

October 1, 2011 Young executives are taking their passion for public service to the top. As government grapples with seemingly intractable problems like shrinking budgets, overlapping missions and cumbersome processes from bygone days, there is some good news. Young leaders are stepping up to redefine the way federal agencies work through better technology,...

from govexec

Keys to the Kingdom

October 1, 2011 Agency IT managers are scrambling to prevent employees' personal phones and tablets from creating new openings for hackers. Ready or not, iPhones, iPads, Droids and other personal wireless devices are invading the federal workplace. Almost no formal security policies or procedures are in place yet to protect agency networks from...

Experts chide TSA for poor risk assessment of security measures

September 30, 2011 This story has been updated. Control over passenger screening technology should be shifted to airlines because the private sector is better than the Transportation Security Administration at making economical security choices based on risk management analyses, officials from a libertarian think tank said during a Capitol Hill briefing Friday. Jim...

from govexec

Experts chide TSA for poor risk assessment of security measures

September 30, 2011 Control over passenger screening technology should be shifted to airlines because the private sector is better than the Transportation Security Administration at making economical security choices based on risk management analyses, officials from a libertarian think tank said during a Capitol Hill briefing Friday. Read the whole story at Nextgov.com.

Software licensing issues delay Pentagon's computer security plan

September 29, 2011 A forthcoming DVD containing standard security settings for quickly configuring computers on the battlefield likely cannot be used departmentwide until each service's multiyear software licenses expire, Pentagon officials said. The point of the unified master gold disk, set to become available during the first quarter of 2012, is to reduce...

from govexec

Software licensing issues delay Pentagon's computer security plan

September 29, 2011 A forthcoming DVD containing standard security settings for quickly configuring computers on the battlefield likely cannot be used departmentwide until each service's multiyear software licenses expire, Pentagon officials said. Read the whole story at Nextgov.com.

OnStar, Supreme Court Weigh Practicality of GPS Spying

September 28, 2011 Navigation service OnStar has scrubbed a planned policy that would have kept tabs on drivers after they canceled their subscriptions, amid a backlash from customers and privacy activists. A recently proposed change to the General Motors subsidiary's terms and conditions stated that starting in December it would continue to collect...

Legal positions on warrantless GPS tracking defy politics

September 28, 2011 Do not expect the U.S. Supreme Court to split along partisan lines when it grapples with an upcoming Obama administration case to decide whether amassing location data from a GPS device on a suspect's vehicle is constitutional, said former Bush administration officials who have argued before the court during both...

Political and industry wrangling likely will delay cybersecurity reforms

September 26, 2011 Republicans are set to deliver House Speaker John Boehner proposals for comprehensive cybersecurity legislation early next month, but disagreements over regulating critical infrastructure sectors and partisan friction make it unlikely the House and Senate will agree on a final big bill by year's end, say people familiar with the negotiations....

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.