recommended reading

author archives

Aliya Sternstein

Senior Correspondent

Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.

Results 1521-1530 of 2710

GAO: Federal network security breaches spike 650 percent

October 3, 2011 Reports of network security incidents at federal agencies have soared 650 percent during the past half-decade, jeopardizing the confidentiality and integrity of sensitive government information, federal auditors charged in a congressionally mandated report. The most prevalent types of cyber events included infections from malicious code -- 30 percent of incidents;...

from govexec

Emerging Leaders

October 1, 2011 Young executives are taking their passion for public service to the top. As government grapples with seemingly intractable problems like shrinking budgets, overlapping missions and cumbersome processes from bygone days, there is some good news. Young leaders are stepping up to redefine the way federal agencies work through better technology,...

from govexec

Keys to the Kingdom

October 1, 2011 Agency IT managers are scrambling to prevent employees' personal phones and tablets from creating new openings for hackers. Ready or not, iPhones, iPads, Droids and other personal wireless devices are invading the federal workplace. Almost no formal security policies or procedures are in place yet to protect agency networks from...

Experts chide TSA for poor risk assessment of security measures

September 30, 2011 This story has been updated. Control over passenger screening technology should be shifted to airlines because the private sector is better than the Transportation Security Administration at making economical security choices based on risk management analyses, officials from a libertarian think tank said during a Capitol Hill briefing Friday. Jim...

from govexec

Experts chide TSA for poor risk assessment of security measures

September 30, 2011 Control over passenger screening technology should be shifted to airlines because the private sector is better than the Transportation Security Administration at making economical security choices based on risk management analyses, officials from a libertarian think tank said during a Capitol Hill briefing Friday. Read the whole story at Nextgov.com.

Software licensing issues delay Pentagon's computer security plan

September 29, 2011 A forthcoming DVD containing standard security settings for quickly configuring computers on the battlefield likely cannot be used departmentwide until each service's multiyear software licenses expire, Pentagon officials said. The point of the unified master gold disk, set to become available during the first quarter of 2012, is to reduce...

from govexec

Software licensing issues delay Pentagon's computer security plan

September 29, 2011 A forthcoming DVD containing standard security settings for quickly configuring computers on the battlefield likely cannot be used departmentwide until each service's multiyear software licenses expire, Pentagon officials said. Read the whole story at Nextgov.com.

OnStar, Supreme Court Weigh Practicality of GPS Spying

September 28, 2011 Navigation service OnStar has scrubbed a planned policy that would have kept tabs on drivers after they canceled their subscriptions, amid a backlash from customers and privacy activists. A recently proposed change to the General Motors subsidiary's terms and conditions stated that starting in December it would continue to collect...

Legal positions on warrantless GPS tracking defy politics

September 28, 2011 Do not expect the U.S. Supreme Court to split along partisan lines when it grapples with an upcoming Obama administration case to decide whether amassing location data from a GPS device on a suspect's vehicle is constitutional, said former Bush administration officials who have argued before the court during both...

Political and industry wrangling likely will delay cybersecurity reforms

September 26, 2011 Republicans are set to deliver House Speaker John Boehner proposals for comprehensive cybersecurity legislation early next month, but disagreements over regulating critical infrastructure sectors and partisan friction make it unlikely the House and Senate will agree on a final big bill by year's end, say people familiar with the negotiations....

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.