AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1511-1520 of 2710

Cybersecurity could be a bright spot in otherwise flat IT budgets

October 18, 2011 Cybersecurity spending is expected to accelerate during the next five years at the Defense Department and civilian agencies, despite overall flat information technology budgets, according to a new industry forecast. Read the full story on Nextgov.

Homeland Security cyber protection office's fate is up in the air

October 14, 2011 FROM NEXTGOV arrow The House is poised to vote on a measure that would not create a permanent Homeland Security Department cybersecurity office, after a committee on Thursday passed authorization legislation that does not mention the program. The move represents a departure from the Senate's version of the bill, which would retain and...

Air Force disputes drone virus reports

October 13, 2011 FROM NEXTGOV arrow In an atypical disclosure, military officials on Wednesday night divulged details of a virus that infected computers supporting drones that fly over battlefields. The announcement came after reports surfaced that malicious software recording the keystrokes of pilots based in Nevada had wreaked havoc on U.S. Predatory and Reaper unmanned aerial...

Privacy concerns might freeze program profiling terrorism suspects

October 11, 2011 FROM NEXTGOV arrow U.S. Immigration and Customs Enforcement is considering whether to halt part of a program that probes profiles of suspects for links to terrorist activity, after federal auditors found the scope of the initiative violates privacy guidelines, federal officials said Tuesday evening. The Pattern Analysis and Information Collection program, or ICEPIC,...

Privacy concerns might freeze program profiling terrorism suspects

October 11, 2011 U.S. Immigration and Customs Enforcement is considering whether to halt part of a program that probes profiles of suspects for links to terrorist activity, after federal auditors found the scope of the initiative violates privacy guidelines, according to a government report released Friday afternoon. Read the full story on Nextgov.

Agency Buy-In Is Key to Obama's Anti-WikiLeaks Order

October 7, 2011 FROM NEXTGOV arrow The government office charged with declassifying confidential information cheered President Obama's new directions to agencies on thwarting insiders who feed websites like WikiLeaks with secret files before their classification time is up. On Friday, Obama issued a long-awaited executive order in response to the scandal surrounding a soldier accused of...

FBI to launch nationwide facial recognition service

October 7, 2011 FROM NEXTGOV arrow The FBI by mid-January will activate a nationwide facial recognition service in select states that will allow local police to identify unknown subjects in photos, bureau officials told Nextgov. The federal government is embarking on a multiyear, $1 billion dollar overhaul of the FBI's existing fingerprint database to more quickly...

FBI to launch nationwide facial recognition service

October 7, 2011 The FBI by mid-January will activate a nationwide facial recognition service in select states that will allow local police to identify unknown subjects in photos, bureau officials told Nextgov. Read the whole story at Nextgov.com.

FedRAMP service expects to meet vendors' demand for cloud certifications by late 2012

October 6, 2011 FROM NEXTGOV arrow Agencies this fall will be able to pick from a small menu of precertified cloud services, but most products will not be covered by a new security program intended to cut down the cost and time of accrediting technologies until 2012, General Services Administration officials told House members Thursday. FedRAMP,...

Departing Pentagon official warns against cutting cybersecurity funding

October 5, 2011 FROM NEXTGOV arrow If Congress fails to broker a deficit reduction deal, the Pentagon will be forced to halt information technology upgrades and shrink military forces, but still will have to boost funding for cyberspace security, outgoing Deputy Defense Secretary William J. Lynn III said Wednesday. The Defense Department faces, at best, upwards...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.