AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1491-1500 of 2710

FBI, Homeland Security defer to each other on immigrants' data

November 4, 2011 The Homeland Security Department and FBI apparently are at odds over which agency is responsible for the criminal records of illegal immigrants. House Republicans on Friday subpoenaed those records for evidence of possible public safety threats. Read the whole story at Nextgov.com.

Tech firms warn about global threat of digital protectionism

November 3, 2011 FROM NEXTGOV arrow U.S. technology firms are urging the Obama administration to stop foreign countries from blocking global Internet commerce under the pretense of national security. Google and Microsoft joined the nonprofit National Foreign Trade Council on Thursday to release policy recommendations aimed at thwarting "digital protectionism," presumably in countries such as China....

Corporate IT Pros are Skeptical of the Cloud, but Feds March On

November 2, 2011 FROM NEXTGOV arrow While the Obama administration hurries to save billions of dollars by moving federal computing online, a new study shows that few information technology managers at leading-edge companies believe Internet "cloud" storage is as secure as in-house data centers. One third of private-sector IT practitioners questioned by the Ponemon Institute believe...

Corporate Intelligence

November 2, 2011 FROM NEXTGOV arrow Businesses operating critical infrastructure, such as the energy and banking sectors, want to join a new government program that would give them access to classified intelligence on cyber threats. The program, which is currently restricted to certain defense contractors, is aimed at strengthening commercial networks serving the military. The thinking...

TSA mum on missing deadline for 100 percent cargo screening

November 2, 2011 FROM NEXTGOV arrow Explosives concealed in cargo on international U.S.-bound passenger planes could go undetected, since the Transportation Security Administration has apparently failed, for the second time, to meet a deadline for scanning all parcels on overseas planes, House Democrats warned TSA officials in a letter demanding an explanation. A year ago, U.S....

TSA mum on missing deadline for 100 percent cargo screening

November 2, 2011 Explosives concealed in cargo on international U.S.-bound passenger planes could go undetected, since the Transportation Security Administration has apparently failed, for the second time, to meet a deadline for scanning all parcels on overseas planes, House Democrats warned TSA officials in a letter demanding an explanation. Read the whole story...

Corporate Intelligence

November 1, 2011 More businesses want access to classified information about threats to vital networks. Businesses operating critical infrastructure, such as the energy and banking sectors, want to join a new government program that would give them access to classified intelligence on cyber threats. The program, which is currently restricted to certain defense...

U.S. satellite breaches may be linked to China

October 31, 2011 FROM NEXTGOV arrow China may have been flaunting its scientific capabilities by meddling with U.S. Earth observation satellites in past years, according to space and computer security experts. Two unusual incidents involving signals targeting a U.S. Geological Survey satellite in 2007 and 2008 were referred to the Defense Department for investigation, USGS officials...

Clinton and Brits Confront Hacker Groups

October 28, 2011 FROM NEXTGOV arrow Secretary of State Hillary Clinton will join her United Kingdom counterparts at a cyberspace conference in London on Nov. 1, just days after British officials acknowledged they received international help in battling cybercrime -- and could use more of it. On Oct. 28, the website of the U.K.'s Foreign and...

DHS drones to monitor nearly entire northern border

October 28, 2011 FROM NEXTGOV arrow The Homeland Security Department plans to fly sensor-mounted unmanned aircraft along a greater expanse of the 5,500-mile border with Canada to spot illegal activity, DHS officials told members of Congress on Friday. Along the rugged northern border, remotely controlled planes -- variants of Pentagon drones -- are better than ground...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.