AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1401-1410 of 2221

LOC Blocks Analysts from Researching WikiLeaks

December 6, 2010 FROM NEXTGOV arrow The Library of Congress, which recently shutoff access to WikiLeaks on its computers, may be unintentionally undermining the research its analysts perform for lawmakers, classification expert Steven Aftergood, who regularly publishes a government secrecy newsletter, blogged on Monday. The Congressional Research Service, a branch of the library that scours bills, ...

SEC scraps plans for new data center

December 6, 2010 FROM NEXTGOV arrow The Securities and Exchange Commission has called off plans to a lease a new data center, according to agency contracting officials. The move, as the end of its current contract nears, marks the second time the regulatory agency has abandoned efforts to find a home for one of two primary ...

Loopholes in global aviation system pose challenges to effective screening, officials say

December 3, 2010 FROM NEXTGOV arrow Loopholes in the global aviation system beyond the control of the Homeland Security Department are stymieing steps to bolster screening, several federal officials told lawmakers. "Legal and cultural factors sometimes inhibit harmonization efforts" to standardize security measures, said Steve Lord, director of homeland security and justice issues for the Government ...

From Nextgov.com: Loopholes in global aviation system pose challenges to effective screening, officials say

December 3, 2010 Loopholes in the global aviation system beyond the control of the Homeland Security Department are stymieing steps to bolster screening, several federal officials told lawmakers. Read the full story on Nextgov.com.

OMB to Detail IT Overhaul Via Webcast

December 2, 2010 FROM NEXTGOV arrow During a webcast next Thursday morning, Office of Management and Budget officials will flesh out the Obama administration's recently-announced strategy to update the way agencies acquire and access information technology. The Dec. 9 Forum on IT Management Reform will be held at the White House at 8:30 a.m. and streamed ...

DHS to Conduct Wireless Security Audits

December 2, 2010 FROM NEXTGOV arrow In light of the discovery that government-issued mobile devices lack security protections, the Homeland Security Department is taking steps to safeguard the executive branch's wireless networks, DHS officials said this week. The Government Accountability Office on Tuesday released a report documenting holes in security guidelines for laptops that are simultaneously ...

White House set to complete security standards for cloud computing services next year

December 2, 2010 FROM NEXTGOV arrow The Obama administration expects to finalize a one-size-fits-all set of security standards for cloud computing services within six months, after wrapping up talks with industry in mid-January 2011, federal Chief Information Officer Vivek Kundra said on Thursday. Cloud computing is the practice of subscribing, as-needed, for hardware and software from ...

From Nextgov.com: White House set to complete security standards for cloud computing services in 2011

December 2, 2010 The Obama administration expects to finalize a one-size-fits-all set of security standards for cloud computing services within six months, after wrapping up talks with industry in mid-January 2011, federal Chief Information Officer Vivek Kundra said on Thursday. Read the full story on Nextgov.com

Two agencies favor Do Not Track option to protect Web user privacy

December 1, 2010 FROM NEXTGOV arrow The Commerce Department believes industry practices to protect Internet users' privacy, such as the creation of a Do Not Track online tool, should be voluntary but enforceable, a department official said on Wednesday. "With or without legislation, we will have to upgrade the role of voluntary but enforceable codes of ...

Watchdog cites gaps in security of wireless devices

December 1, 2010 FROM NEXTGOV arrow Federal auditors have found holes in the security of wireless technology, including smart phones, Bluetooth devices and laptop computers, that federal employees use regularly in the office and on the go. "Until [agencies] take steps to fully implement leading security practices, federal wireless networks will remain at increased vulnerability to ...