recommended reading

author archives

Joseph Marks

Senior Correspondent

Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.

Results 11-20 of 1487

Delays and Bugs in Immigrant Vetting System Trouble Lawmakers

March 16, 2017 Shutdowns, delays and budget overruns in the information technology system the government’s immigration service uses could allow terrorists or criminals to mistakenly receive citizenship or green cards, lawmakers fretted Thursday. The United States Citizenship and Immigration Services’ tech troubles date back to 2006 when the agency began a massive program...

What Trump's Skinny Budget Says About Cybersecurity

March 16, 2017 President Donald Trump’s 2018 budget blueprint, released Thursday, touts major investments in cybersecurity, including a $61 million hike to help the FBI and the Justice Department combat criminals and terrorists’ use of encrypted communication tools. The document is light on specifics, however, and does not include a top line figure...

Trump Advisor Promises A Plan to Improve Federal Network Security

March 16, 2017 President Donald Trump’s budget, due out Thursday, will include early indications of a broad plan to upgrade the security of federal networks, Trump’s top homeland security adviser said Wednesday. Don’t expect a multibillion-dollar investment that will modernize government cybersecurity in one fell swoop, though, Homeland Security Adviser Tom Bossert said...

No Evidence of Trump Wiretap, House Intel Leaders Say

March 15, 2017 There’s no evidence U.S. intelligence agencies wiretapped Donald Trump’s campaign as the president claimed on Twitter this month, leaders of the House Intelligence Committee said Wednesday. The panel’s Democratic leader, Rep. Adam Schiff, D-Calif., urged the president to retract or explain his statement in the wake of that conclusion while...

Expect a Cyber Budget Boost But Stay Tuned for that Executive Order, Homeland Adviser Says

March 15, 2017 President Donald Trump’s budget, due out Thursday, will include early indications of a broad plan to upgrade the security of federal networks, Trump’s top homeland security adviser said Wednesday. Don’t expect a multibillion-dollar investment that will modernize government cybersecurity in one fell swoop, though, Homeland Security Adviser Tom Bossert said...

White House’s Annual Cyber Report Counts 30,000 Incidents but Only 16 are 'Major'

March 14, 2017 Federal agencies have made solid progress securing their sensitive data against malicious hackers and employee lapses, but there’s still a long road ahead, according to a recently released White House report. More than 30,000 data security incidents compromised federal information systems during the 2016 fiscal year, 16 of which were...

Trump Cyber Czar Brings Deep Expertise but Maybe Some Baggage, Too

March 13, 2017 President Donald Trump’s pick to lead White House cybersecurity policy efforts brings a wealth of experience defending and exploiting computer networks, but he also brings three letters that could make him a tough sell to industry and privacy advocates: N-S-A. Trump plans to appoint Rob Joyce, chief of the National...

WikiLeaks Dump Shines Light on Government's Shadowy Zero-Day Policy

March 13, 2017 WikiLeaks’ massive release of CIA cyber exploits this week produced more questions than answers about the government’s shadowy procedure for hoarding damaging digital vulnerabilities that remain unknown even to a system's manufacturer. These bugs—called zero days because industry has had zero days to create and promulgate a software patch—can be...

WikiLeaks Dump Shines Light on Government's Shadowy Zero-Day Policy

March 10, 2017 WikiLeaks’ massive release of CIA cyber exploits this week produced more questions than answers about the government’s shadowy procedure for hoarding damaging digital vulnerabilities that remain unknown even to a system's manufacturer. These bugs—called zero days because industry has had zero days to create and promulgate a software patch—can be...

Government Isn't Sharing Cyber Threats As Promised, Private Sector Says

March 9, 2017 When it comes to cyber threat information sharing, it’s government that’s not holding up its end of the bargain, industry officials told lawmakers Thursday. Government classification frequently hinders cybersecurity companies’ ability to share information with clients and others in the private sector, effectively giving an adversary a broader playing ground,...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.