recommended reading

author archives

Joseph Marks

Senior Correspondent

Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.

Results 41-50 of 1368

Obama to Successor: Put Fed IT Under One Roof, For Its Own Protection

October 28, 2016 Obama administration cyber officials plan to urge the next president’s team to drastically centralize information technology services to reduce the risk of another massive data breach, a White House official said today. Those officials are preparing an “options paper” for the next president’s transition team that envisions consolidating IT services...

Lawmakers Press Justice Department on Expanded Police Hacking Powers

October 27, 2016 Nearly two dozen lawmakers queried the Justice Department today about a controversial expansion of police hacking powers scheduled to take effect Dec. 1. The change, an update to Rule 41 of the Federal Rules of Criminal Procedure, would allow a single judge to issue a warrant allowing police to hack...

White House to Push to Centralize IT to Protect Crown Jewels

October 27, 2016 Obama administration cyber officials plan to urge the next president’s team to drastically centralize information technology services to reduce the risk of another massive data breach, a White House official said today. Those officials are preparing an “options paper” for the next president’s transition team that envisions consolidating IT services...

US CIO Makes Final Push to Shore Up Government Cyber Vulnerabilities

October 27, 2016 Agencies should ramp up their focus on modernizing outdated information technology systems that could prove vulnerable to cyber breaches, according to guidance released this morning by federal Chief Information Officer Tony Scott. The plan directs agencies to identify outdated systems at high risk for being exploited by cyber adversaries and...

DHS Races to Get Obama’s Signature on Cyber Response Plan

October 26, 2016 The Homeland Security Department wants to make sure an updated plan for how the government responds to major cyberattacks is set in stone before President Barack Obama leaves office, a DHS official said today. The alternative is leaving the country with a 6-year-old interim plan while a new presidential administration...

It’s On: US Mulls Tricky Options for Retaliation Against Russian Hacks

October 26, 2016 The decision by top intelligence and Homeland Security officials to attribute election-related data breaches to top Russian government officials earlier this month marked a sea change in cyber relations between the two former Cold War adversaries. Eight years after Russian hackers were first rumored to be behind an attack that...

CYBERCOM: We're Ready For War

October 26, 2016 U.S. Cyber Command’s 133 Cyber Mission Force teams reached initial operating capability last week, the command said in a statement Monday. The milestone comes six years after the new command launched and two years before it’s scheduled to reach full operating capability. It also comes as the Pentagon and intelligence...

CYBERCOM Reaches Initial Operating Capability

October 25, 2016 U.S. Cyber Command’s 133 Cyber Mission Force teams reached initial operating capability last week, the command said in a statement Monday. The milestone comes six years after the new command launched and two years before it’s scheduled to reach full operating capability. It also comes as the Pentagon and intelligence...

DHS Is Drawing Up 'Strategic Principles' for Internet of Things

October 25, 2016 U.S. officials believe the cyberattack that interrupted Twitter, Netflix and other websites Friday has been mitigated, Homeland Security Department Secretary Jeh Johnson said in a statement Monday. DHS held an information sharing conference call with 18 major communication services providers the day the distributed denial of service, or DDoS, attack...

DHS Secretary: DDoS Attack ‘Mitigated’

October 24, 2016 U.S. officials believe the cyberattack that interrupted Twitter, Netflix and other websites Friday has been mitigated, Homeland Security Department Secretary Jeh Johnson said in a statement today. DHS held an information sharing conference call with 18 major communication services providers the day the distributed denial of service, or DDoS, attack...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.