AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 111-120 of 2537

DHS Wants Self Destructing Phones

September 24, 2015 The Department of Homeland Security is funding a Boeing company to create a "brain chip" for its self-destructing Black smartphone that could be adapted for any device, DHS officials say. The technology powering the devices potentially could identify the user’s walking style, for example. Officials would be alerted if the...

Tax Collectors Want 'Selfies' to Prove You Are Who You Say You Are

September 24, 2015 FROM NEXTGOV arrow Some state revenue agencies and motor vehicle departments are receiving federal funds to verify the smartphone selfies of taxpayers, say government and corporate officials involved. Individuals residing in North Carolina and Georgia will be allowed late next year to download a facial recognition app -- for selfie matching -- that...

The Top 10 Women Cyber Guardians You Should Know About

September 23, 2015 (This article originally appeared on Nextgov) The paucity of women in math and science extends to the data security realm. Women make up 14 percent of federal government cyber personnel, according to a May (ISC)2 global information security workforce study. The number was even lower in the private sector as...

DHS Wants Boeing to Test a Brain Chip in Firm’s Self-Destructing 'Black' Spyphone

September 22, 2015 FROM NEXTGOV arrow The Department of Homeland Security is funding a Boeing company to create a "brain chip" for its self-destructing Black smartphone that could be adapted for any device, DHS officials say. The technology powering the devices potentially could identify the user’s walking style, for example. Officials would be alerted if the...

US, China Race To Boost Military Coding Personnel

September 21, 2015 As U.S. and Chinese leaders reportedly negotiate red lines in cyberspace, there is a hacker troop build-up playing out in their respective countries. It is believed China's People's Liberation Army has the deeper bench, with an estimated 100,000 code warriors recruited over the past two decades, and the world's most...

Pentagon Races to Boost Cyber Troop Size

September 21, 2015 FROM NEXTGOV arrow As U.S. and Chinese leaders reportedly negotiate red lines in cyberspace, there is a hacker troop build-up playing out in their respective countries. It is believed China's People's Liberation Army has the deeper bench, with an estimated 100,000 code warriors recruited over the past two decades, and the world's most...

Hackers Fool Bitpay Execs and Expose Lloyds Premier Account Holders, While Insiders Accidentally Leak Patient Records on Amazon Cloud

September 21, 2015 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Hacker Cons Virtual Currency Processor Bitpay Out of $1.8M Bryan Krohn, the company’s chief financial officer, got an email from someone purporting to be an editor at a digital currency magazine. The message...

While the US Army Sharpens Its Cyber Defenses, the Navy Faces the 'Real' Deal Right Now

September 18, 2015 Army leaders deployed in foreign territory have a lot of data at their fingertips to help avoid surprise attacks, such as digital maps of minefield locations. But the man in charge of shielding those information flows has questions about the tools and training that will be needed as cyber threats...

Army CYBERCOM Conducts ‘Experiments,’ While Navy Cyber Fleet Faces 'Real’ Deal

September 18, 2015 FROM NEXTGOV arrow Army leaders deployed in foreign territory have a lot of data at their fingertips to help avoid surprise attacks, such as digital maps of minefield locations. But the man in charge of shielding those information flows has questions about the tools and training that will be needed as cyber threats...

Federal Inspectors Want to Double-Check How Agencies Fared During ‘Cyber Sprint’

September 17, 2015 FROM NEXTGOV arrow Internal watchdogs want to double-check that agencies have made as much progress practicing basic cyber hygiene as they told the White House in July. The Obama administration in June launched a so-called 30-day cybersecurity sprint, commanding agencies to monitor computer logs, patch critical vulnerabilities and cut the number of "privileged"...