recommended reading

author archives

Joseph Marks

Senior Correspondent

Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.

Results 41-50 of 1554

Advice to Trump: Top Cybersecurity Talent Costs Money

April 19, 2017 The Trump administration should revamp the way the government hires, pays and retains cybersecurity talent, a major information security accrediting organization said Wednesday. That includes expanding a pay incentive program within the Homeland Security Department’s cyber operations division that offers a 20 to 25 percent pay bump for new cyber...

Government Needs ‘Heavy Artillery’ for Cyberspace, DHS Chief Says

April 19, 2017 The government must upgrade the digital weapons it uses to defend federal networks from nation-state and criminal hackers, Homeland Security Secretary Gen. John Kelly said Tuesday. Kelly cited “nation-state actors with extremely sophisticated tools,” “lone wolves” and “cyber terrorists that simply buy malware on the internet” as top cyber adversaries...

Government Needs ‘Heavy Artillery’ for Cyberspace, DHS Chief Says

April 18, 2017 The government must upgrade the digital weapons it uses to defend federal networks from nation-state and criminal hackers, Homeland Security Secretary Gen. John Kelly said Tuesday. Kelly cited “nation-state actors with extremely sophisticated tools,” “lone wolves” and “cyber terrorists that simply buy malware on the internet” as top cyber adversaries...

DARPA Thinks Military Strategists Could Learn a Lot from Video Games

April 17, 2017 The Defense Department’s moonshot tech agency is on the lookout for video games that can help military leaders think strategically about conflicts. The goal is to improve DOD’s war-gaming activities—essentially, playing "what if they did this and we did that?" national security scenarios out to their second, third and fourth...

Microsoft Outlines Cyber Geneva Convention Proposal

April 14, 2017 Microsoft, which has long been among the top corporate boosters for international cooperation in cyberspace, published a trio of documents Thursday supporting a “Digital Geneva Convention.” The publications are a list of binding rules for nations and tech companies to follow in cyberspace, plus the outline for an international organization...

CIA Director Pledges to Ramp Up Digital Defenses Against WikiLeaks, Insider Threats

April 13, 2017 CIA Director Mike Pompeo on Thursday lashed out against WikiLeaks founder Julian Assange and National Security Agency leaker Edward Snowden and pledged a relentless focus on data security to prevent them and likeminded activists from stealing and releasing U.S. intelligence information. “While I can’t go into detail about the exact...

Trump Wants to Overhaul Federal IT, But He’s Missing the People Who Could Help

April 13, 2017 Donald Trump rode to the presidency with a promise to bring fresh thinking from industry and a can-do spirit to the sclerotic world of Washington. That promise, if fulfilled, could pay dividends for government’s outdated and highly vulnerable technology infrastructure pummeled by cyberattacks during the Obama administration. It could also...

Mismanagement Could Scuttle Trump Cyber, IT Modernization Plans

April 13, 2017 Donald Trump rode to the presidency with a promise to bring fresh thinking from industry and a can-do spirit to the sclerotic world of Washington. That promise, if fulfilled, could pay dividends for government’s outdated and highly vulnerable technology infrastructure pummeled by cyberattacks during the Obama administration. It could also...

Industry Urges Changes to NIST Framework Update

April 11, 2017 The government’s cyber standards agency should add a section to its cybersecurity framework promoting best practices for organizations to receive digital vulnerability reports from security researchers, a coalition of cyber companies and advocacy groups said Monday. That section should include processes for receiving, reviewing and responding to vulnerability disclosures, according...

Tired: Stealing Data. Wired: Holding a Dam for Ransom

April 11, 2017 A cadre of shadowy criminal hackers seizes control of an energy plant. They give themselves administrator privileges and lock the genuine administrators out along with everyone else. Then, they threaten to trigger a major leak or explosion if the plant owners don’t pay up: $50 million in bitcoin. The story...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.