AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1491-1500 of 2710

FBI, Homeland Security defer to each other on immigrants' data

November 4, 2011 The Homeland Security Department and FBI apparently are at odds over which agency is responsible for the criminal records of illegal immigrants. House Republicans on Friday subpoenaed those records for evidence of possible public safety threats. Read the whole story at Nextgov.com.

Tech firms warn about global threat of digital protectionism

November 3, 2011 FROM NEXTGOV arrow U.S. technology firms are urging the Obama administration to stop foreign countries from blocking global Internet commerce under the pretense of national security. Google and Microsoft joined the nonprofit National Foreign Trade Council on Thursday to release policy recommendations aimed at thwarting "digital protectionism," presumably in countries such as China....

Corporate IT Pros are Skeptical of the Cloud, but Feds March On

November 2, 2011 FROM NEXTGOV arrow While the Obama administration hurries to save billions of dollars by moving federal computing online, a new study shows that few information technology managers at leading-edge companies believe Internet "cloud" storage is as secure as in-house data centers. One third of private-sector IT practitioners questioned by the Ponemon Institute believe...

Corporate Intelligence

November 2, 2011 FROM NEXTGOV arrow Businesses operating critical infrastructure, such as the energy and banking sectors, want to join a new government program that would give them access to classified intelligence on cyber threats. The program, which is currently restricted to certain defense contractors, is aimed at strengthening commercial networks serving the military. The thinking...

TSA mum on missing deadline for 100 percent cargo screening

November 2, 2011 FROM NEXTGOV arrow Explosives concealed in cargo on international U.S.-bound passenger planes could go undetected, since the Transportation Security Administration has apparently failed, for the second time, to meet a deadline for scanning all parcels on overseas planes, House Democrats warned TSA officials in a letter demanding an explanation. A year ago, U.S....

TSA mum on missing deadline for 100 percent cargo screening

November 2, 2011 Explosives concealed in cargo on international U.S.-bound passenger planes could go undetected, since the Transportation Security Administration has apparently failed, for the second time, to meet a deadline for scanning all parcels on overseas planes, House Democrats warned TSA officials in a letter demanding an explanation. Read the whole story...

Corporate Intelligence

November 1, 2011 More businesses want access to classified information about threats to vital networks. Businesses operating critical infrastructure, such as the energy and banking sectors, want to join a new government program that would give them access to classified intelligence on cyber threats. The program, which is currently restricted to certain defense...

U.S. satellite breaches may be linked to China

October 31, 2011 FROM NEXTGOV arrow China may have been flaunting its scientific capabilities by meddling with U.S. Earth observation satellites in past years, according to space and computer security experts. Two unusual incidents involving signals targeting a U.S. Geological Survey satellite in 2007 and 2008 were referred to the Defense Department for investigation, USGS officials...

Clinton and Brits Confront Hacker Groups

October 28, 2011 FROM NEXTGOV arrow Secretary of State Hillary Clinton will join her United Kingdom counterparts at a cyberspace conference in London on Nov. 1, just days after British officials acknowledged they received international help in battling cybercrime -- and could use more of it. On Oct. 28, the website of the U.K.'s Foreign and...

DHS drones to monitor nearly entire northern border

October 28, 2011 FROM NEXTGOV arrow The Homeland Security Department plans to fly sensor-mounted unmanned aircraft along a greater expanse of the 5,500-mile border with Canada to spot illegal activity, DHS officials told members of Congress on Friday. Along the rugged northern border, remotely controlled planes -- variants of Pentagon drones -- are better than ground...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.