recommended reading

author archives

Joseph Marks

Senior Correspondent

Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.

Results 721-730 of 1368

MyTSA Coming Down to Earth

September 14, 2012 The Homeland Security Department is considering developing a mobile application similar to its MyTSA app but for land travel across the Canadian and Mexican borders, an official said Friday. MyTSA provides information about wait times at U.S. airport security lines based on crowdsourced traveler reports. The proposed new app from...

GAO gives agencies good marks on e-gov compliance

September 14, 2012 Federal agencies led by the Office of Management and Budget have done a solid job of complying with the 2002 E-Government Act but could improve the way they gather performance metrics and report on agency progress, a watchdog said Friday. The Government Accountability Office report lists numerous federal products and...

EPA to move email to the cloud by early 2013

September 14, 2012 The Environmental Protection Agency will move its roughly 18,000 employees to a cloud-based email and collaboration system by early 2013, EPA said in a statement Friday. Officials expect the Microsoft-based email and collaboration system to save the agency about $12 million over four years, according to the statement. EPA contracted...

Could a workplace social network replace email and phone? One agency thinks so.

September 14, 2012 The National Nuclear Security Administration plans to roll out a workplace social network next spring that will replace much of the agency’s emailing and phone calls, Chief Technology Officer Travis Howerton said Friday. The platform, called One Voice, is a pilot that other divisions of the Energy Department may adopt...

Biggest federal crowdsourcing challenges aren’t technical

September 13, 2012 The greatest challenges that federal agencies face when trying to draw crowdsourced information from citizens on social media aren’t technical; they’re organizational, political and legal, an analyst at the U.S. Agency for International Development’s GeoCenter said Thursday. Shadrock Roberts’ team worked extensively with USAID attorneys before launching a crowdsourcing project...

Benghazi Attack Brings Online Gamers Together

September 12, 2012 Online communities can be sensitive places during a crisis. I wrote in April, for instance, about how the rapid spread of Facebook rumors was robbing some military widows of what small comfort they might have taken from receiving the military’s traditional in-person notification of their husbands deaths. Wednesday’s killing of...

Government Printing Office adopts internal XML system

September 12, 2012 The Government Printing Office is adopting a new system that will manage and publish congressional bills and other publications entirely in a pared down and machine-readable XML format, the company providing the system announced Wednesday. GPO plans to launch a “proof of concept” for the new system with congressional bills...

Does the Federal CIO Shop Need Bold Vision or Implementation?

September 12, 2012 It’s an old trope in government that too much change all at once can start to yield diminishing returns. That’s why government executives who make major changes are often succeeded by managers who, either by temperament or necessity, focus on implementing their predecessor’s big initiatives, making sure all the new...

GoDaddy outage briefly took down FedBizOpps, three other GSA sites

September 11, 2012 The hours long outage at GoDaddy.com Monday briefly took down four General Services Administration websites, among them FedBizOpps.gov, which posts information and specifications for billions of dollars in federal contracting opportunities, a spokesman said. GSA did not contract directly with GoDaddy to host the sites or for anything else, agency...

How the iPhone Changed Government and Society: A Quick Review

September 11, 2012 With Apple’s iPhone 5 slated to launch Wednesday and the tech world abuzz with rumors, now’s a good time to review how the indispensable smartphone has changed government and society. To start, note this May study from the Government Business Council, the research arm of Government Executive and Nextgov, which...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.