recommended reading

author archives

Joseph Marks

Senior Correspondent

Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.

Results 1-10 of 1548

CYBERCOM Budget Request Focused on Elevation to Full Command

5:38 PM ET U.S. Cyber Command is requesting $647 million in President Donald Trump’s budget, roughly a 17 percent jump from the prior year, CYBERCOM Chief Adm. Michael Rogers told lawmakers Tuesday. That funding hike will mostly go to readying CYBERCOM’s elevation to a full combatant command, which was authorized in a recent...

Here’s How the Trump Budget Treats Cyber

2:41 PM ET President Donald Trump’s 2018 budget proposal boosts cyber defense funding at the Homeland Security Department and commits new money to help law enforcement fight cyber criminals and ferret out the communications of terrorists and criminals using cop-proof encryption. The budget also touts that, for the first time, it aligns federal...

Senator Presses FTC on Hackable Toys

May 22, 2017 Sen. Mark Warner, D-Va., Monday pressed the Federal Trade Commission on what the agency is doing to keep hackable children’s toys out of the marketplace. The letter follows a report from security researcher Troy Hunt about CloudPets, an internet-connected teddy bear that allows parents to send recorded messages to their...

Government Needs Strategic Vision for Emerging Tech, Advisory Group Says

May 19, 2017 The Trump administration should develop a strategic plan to optimize how the federal government will take advantage of advances in networking speed and efficiency similar to the way the Obama administration planned for the transition to cloud computing, an advisory group said Thursday. That plan should include specific recommendations to...

DHS Lags on Some FITARA Benchmarks

May 18, 2017 The Homeland Security Department is lagging on at least three key requirements to improve how it buys technology, according to a watchdog report released Thursday. DHS isn’t sufficiently leveraging TechStat, an Obama-era process for soup-to-nuts reviews of troubled technology investments, according to the Government Accountability Office review. The department is...

White House Adviser Wants to Move Cyber Risk Decisions Up the Chain

May 18, 2017 A key goal of President Donald Trump’s recent cybersecurity executive order is to manage cyber risk on a governmentwide level rather than allowing agencies to make ad hoc determinations, the president’s top cyber adviser told an advisory board Thursday. Currently, as a result of either budget constraints or poor cyber...

These Homeland Security Cyber Tools Are Now Available for Private Sector

May 16, 2017 When an organization’s IT staff members are alerted about a possible cyber intrusion, they jump into detective mode, poring over reams of data to figure out what changed in the minutes, days and weeks before the alarm bell sounded. But the data these detectives have to work with is often...

White House: No U.S. Federal Systems Hit By WannaCry Ransomware

May 15, 2017 A massive ransomware offensive that raged across 150 countries has not hit any U.S. federal agencies or critical infrastructure such as energy plants and airports, President Donald Trump’s top homeland security adviser said Monday. The campaign has struck more than 300,000 machines globally, Homeland Security Adviser Tom Bossert said during...

NIST Unveils 'Framework Meets FISMA' Cyber Best Practices

May 15, 2017 The government’s cyber standards agency released draft guidance Friday outlining cybersecurity best practices for federal agencies. The long-planned initiative came just one day after President Donald Trump issued an executive order mandating federal agencies implement a cybersecurity framework that agency, the National Institute of Standards and Technology, developed or face...

GSA Tech Office Launches Bug Bounty Program

May 12, 2017 The cybersecurity company that ran a bug bounty program for the Army and is running ongoing programs for the Pentagon and Air Force will run a similar program for the government’s technology user experience wing, that office announced Friday. The program run by HackerOne will offer cash rewards ranging from...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.