recommended reading

author archives

Aliya Sternstein

Senior Correspondent

Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.

Results 21-30 of 2710

Defense Intelligence Agency Is Scoping Out Social Media Background Checkers

July 18, 2016 The Pentagon is conducting market research for a planned 12-month "social media checks" pilot that would analyze public posts to help determine an employee's suitability for Defense Intelligence Agency classified work. The effort is part of a shift away from screening intelligence and military staff every five years, as is...

Hackers Target Sports Training Clinic, N.C. State; Alabama and Oklahoma Accidentally Leak Security-Sensitive Data

July 18, 2016 In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Sports Clinic Owner Alleges MLB Hacked His Social Media Presence DNA Sports Labs, a training and sports science lab in Florida, relied on social media, including YouTube and Facebook for advertising, and depended...

An Inside Look At a CYBERCOM Dress Rehearsal

July 15, 2016 During a recent hack attack drill, Cyber Command troops botched an attempt to stop compromised energy machinery from leaking oil -- and that was the intention, the Pentagon says. "We do that because at the point of failure, that's where learning will occur," Rear Adm. Kevin Lunday, CYBERCOM director of...

Like Battlebots, Except These Robots Automatically Patch CyberSecurity Holes

July 14, 2016 The Pentagon agency that brought you robotic cars will bring robotic hackers to a Vegas resort next month. The $2 million Cyber Grand Challenge, sponsored by the Defense Advanced Research Projects Agency, will pit machines against insecure software to pierce the holes—and fix 'em. The entire event will be shown...

White House Wants 3,500 ‘Critical’ New Cyber Jobs Filled In 5 Months

July 14, 2016 The White House on Tuesday unveiled a recruitment agenda that envisions a tour of duty fighting hackers for the U.S. government as part of any private cyber pro's career. "The supply of cybersecurity talent to meet the increasing demand of the federal government is simply not sufficient," officials from the...

It’ll Be Brains vs. Bots in Vegas Cyberwar Sponsored by the Pentagon

July 13, 2016 The Pentagon agency that brought you robotic cars will bring robotic hackers to a Vegas resort next month. The $2 million Cyber Grand Challenge, sponsored by the Defense Advanced Research Projects Agency, will pit machines against insecure software to pierce the holes -- and fix 'em. The entire event will...

Federal Government Expects to Bring on 3,500 More Cyber Pros by 2017

July 12, 2016 The White House on Tuesday unveiled a recruitment agenda that envisions a tour of duty fighting hackers for the U.S. government as part of any private cyber pro's career. "The supply of cybersecurity talent to meet the increasing demand of the federal government is simply not sufficient," officials from the...

Treasury Says It Needs Some New Security Features for Next-Gen Money

July 11, 2016 Now's the chance to make your mark on the next series of U.S. dollar bills. The Bureau of Engraving and Printing later this month is expected to start competing a contract for the creation of features -- like special fibers and optical tricks -- to prevent forgery. The anti-counterfeit markers...

Hackers Post Police Records after Sterling Shooting, Show NATO Gen. Plotted Against Obama, and Broach NASA Twitter Account

July 11, 2016 In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Activist Leaks Law Enforcement Database after Louisiana Police Shooting Days after the killing of a black man by Baton Rouge officers prompted global outrage, an individual posted online 50,000 poached city police records....

House Committee OKs Bill Letting the FBI Use Rapid DNA Profiling

July 8, 2016 A DNA evidence bill that would let police in the field, not just technicians in an accredited lab, quickly test the genetic material of suspects has advanced to the House floor. The measure centers around a relatively new screening instrument the size of a printer, called Rapid DNA. The idea...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.