AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 101-110 of 2669

Could a Name Change Clarify What DHS' Cyber Team Actually Protects?

March 10, 2016 FROM NEXTGOV arrow The head of the National Protection and Programs Directorate has been urging Congress to change the office’s name to something that specifies what it does. The new, preferred title, “Cyber and Infrastructure Protection Agency,” might provide employees with the clear sense of identity and mission that she told House lawmakers...

Federal Agencies are Using Last Summer’s ‘Cyber Sprint’ to Justify Sole-Source IT Contracts

March 9, 2016 FROM NEXTGOV arrow Several federal agencies are not letting eligible companies compete for IT contracts, reasoning that only a current or other favored supplier can handle work demanded by a 30-day cybersecurity exercise. But that exercise was supposed to have ended last July, and some of these so-called sole-source contracts issued by the...

CORRECTED: The Ransomware Threat to Agencies

March 7, 2016 FROM NEXTGOV arrow Editor’s Note: This story has been corrected and revised. The claim that the FBI and the Department of Homeland Security have paid off hackers to remove malicious software from their systems, as described in a new report from the Institute for Critical Infrastructure Technology, is not accurate, according to one...

Hackers Take Special Ed Students’ Secrets, Book Marriott Hotel Room, and Deceive Snapchat Payroll Employee

March 7, 2016 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Stolen Laptop Held Data on Hundreds of Md. Special Ed Students The machine was taken from WestEd, a nonprofit organization that had assisted Montgomery County, Maryland, school system officials with a review of...

FAA Working on New Guidelines for Hack-Proof Planes

March 4, 2016 FROM NEXTGOV arrow The Federal Aviation Administration has begun shaping cybersecurity regulations for airplane manufacturers, amid warnings that the criss-crossing of onboard networks poses risks to flight safety. Researchers have been invited to build upon an FAA-developed framework for testing a plane’s susceptibility to hacks, agency officials announced on a federal contracting site....

Pentagon Launches First-of-Its-Kind Bug Bounty Program

March 3, 2016 Challenged by hackers and staffing shortages, the Pentagon is inviting plainclothes techies to a competition where they can poke around military code for security bugs. The idea is to find and fix vulnerabilities unknowingly inserted in software before the bad guys do. The contest draws inspiration from "bug bounty" programs...

‘Hack the Pentagon’: Will DOD’s Bug Bounty Program Attract Top Talent?

March 2, 2016 FROM NEXTGOV arrow Challenged by hackers and staffing shortages, the Pentagon is inviting plainclothes techies to a competition where they can poke around military code for security bugs. The idea is to find and fix vulnerabilities unknowingly inserted in software before the bad guys do. The contest draws inspiration from "bug bounty" programs...

House Panel Wants to Give Agency CIOs Authority to Crack Down on Personal Email Use

March 1, 2016 FROM NEXTGOV arrow Lawmakers on Tuesday advanced legislation that would let federal agencies stop employees from accessing personal email and other online programs or using personal devices for security purposes -- without consulting unions. The measure stems from recent incidents at the Department of Homeland Security and the Office of Personnel Management, where...

CYBERCOM Chief Says More Industry Heads Will Roll After Hacks

February 29, 2016 FROM NEXTGOV arrow This story has been updated. The commander of the military's cyberspace troops warned Monday that more corporate heads will roll as companies continue to overlook security holes. But at federal agencies -- and, still, in many private firms -- bosses have been slow to take the blame for hacks. U.S...

Hackers Pay Family’s AT&T Bill, Phish for Celeb Nudies, and Infiltrate the UN World Tourism Organization

February 29, 2016 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Oregon Man Cops to Phishing for Naked Pics of Celebs Andrew Helton, 29, admits he misrepresented himself as an Apple and Google employee in fraudulent emails sent to Apple and Gmail account holders...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by eSignLive by VASCO

    Mobile E-Signatures for Government

    Learn 5 key trends that accelerate government demand for mobile signing.

    Download
  • Sponsored by Management Concepts

    SPONSORED: Successful Change Management Practices in the Public Sector

    How governmental agencies implement organizational change management.

    Download
  • Sponsored by Kronos

    Solving the Workforce Compliance Challenge

    Download this eBook to learn how data and automation can help state and local agencies.

    Download

When you download a report, your information may be shared with the underwriters of that document.