recommended reading

author archives

Joseph Marks

Senior Correspondent

Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.

Results 711-720 of 1368

A new breed of mercenary: Tweeting for hire

September 24, 2012 More repressive regimes are combating online critics by paying pro-government bloggers to “tout the official point of view, discredit opposition activists, or disseminate false information” in online comment streams and on social media, according to an international watchdog report released Monday. This practice was once mostly limited to China and...

One year later We the People petitioners have mixed reviews

September 21, 2012 As it approaches its one-year anniversary, the White House website that invites people to petition the government and promises to respond to the most popular appeals is getting mixed reviews from users. Kathleen Summers credited We the People, which will turn one on Saturday, with bringing greater public attention to...

Labor cancels social media monitoring solicitation

September 20, 2012 The Labor Department canceled a solicitation to monitor numerous news sources including social media Thursday, two days after it went out. A note on the FBO.gov federal contracting site said there was no information on if or when the solicitation would be offered again. A program to monitor social media...

Issa proposes legislation to reboot federal IT

September 20, 2012 This story was updated to include a comment from Rep. Gerry Connolly. Rep. Darrell Issa, R-Calif., is floating proposed legislation that would drastically reform the way federal technology is purchased, including by granting agency chief information officers authority over their information technology budgets. CIOs have long sought budget authority as...

GSA plans to integrate program management with Google Apps

September 19, 2012 The General Services Administration plans to purchase technology that will link its program management schedules and timelines with Google tools, such as calendars and the Google Drive document system, procurement documents posted Tuesday show. Agency officials estimate an enterprise license for the cloud-based system from vendor Smartsheet.com will cost $75,000...

RSA and Booz Allen Hamilton partner for cyber incidence response

September 19, 2012 Security firms RSA and Booz Allen Hamilton are partnering to offer agencies and companies support and consulting services for responding to computer attacks, the companies announced Wednesday. The goal of the joint venture is to shorten the time it takes to identify threats and fix compromised systems. The arrangement will...

Smartphone friendly, congressional search site unveiled

September 19, 2012 This story has been updated to add additional comment. The Library of Congress unveiled a new Web search tool for bills and other congressional records Wednesday that eventually will replace the 17-year-old Thomas.gov website. Congress.gov, which was launched in a beta form, will automatically adapt to fit computer, smartphone and...

Green Button Initiative Gets Down to Business

September 19, 2012 The Commerce Department’s National Institute of Standards and Technology has picked HyperTek Inc. to expand the reach of the Green Button Initiative aimed at giving companies and individuals easy access to information about their electricity usage, solicitation documents show. The requirements of the $175,000 contract are to coordinate with standards...

CIO Council Relaunches CIO.gov

September 18, 2012 The main Web page for the federal Chief Information Officers Council relaunched Tuesday in a beta version aimed at providing better navigation and more functionality. The council is seeking public feedback before finalizing the redesign, through the site’s feedback page and on Twitter. Here’s from the announcement: We have pulled...

Feds predict $16.6 billion in cloud savings, triple OMB’s estimates

September 18, 2012 Federal managers believe they can save more than $16 billion annually by moving critical technology infrastructure to cloud computing, a survey released Wednesday shows. That’s more than three times the highest figure to come from the Office of Management and Budget. In May 2011, then-federal Chief Information Officer Vivek Kundra...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.