AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1561-1570 of 2704

Say goodbye to traditional immigration processing forms

August 29, 2011 In preparation for a long-delayed transition to online processing of immigration applications, the Homeland Security Department has released new rules for describing forms and filing procedures in official policies. Read the whole story at Nextgov.com.

Researchers Uncover the File That Triggered RSA SecurID Breach

August 26, 2011 FROM NEXTGOV arrow Researchers have located an infected email that cyberspies in March sent personnel at federal contractor EMC to steal security-sensitive information from the maker of widely-used RSA SecurID network login products, said officials at F-Secure Security Labs Friday. Apparently, an EMC employee, again, was responsible for the data exposure. In March,...

Mother Nature and nuclear reactors prove powerful allies for communications advocates

August 25, 2011 FROM NEXTGOV arrow Emergency phone and Internet systems have been deployed for federal radiological responders to aid Virginia's North Anna nuclear power plant in the event any problems develop as a result of Tuesday's earthquake or the arrival of Hurricane Irene, agency officials said. But there are no such dedicated communication lines between...

National Archives Shreds SEC Over Records Trashing Allegations

August 19, 2011 FROM NEXTGOV arrow The National Archives and Records Administration is lambasting the Securities and Exchange Commission for allegedly destroying digital records, amid reports that the agency deleted thousands of files on financial institutions under scrutiny. SEC had not forged an agreement with NARA on a timetable for deleting this information, so, under federal...

Auditors: IRS plan compromises security for e-payment users

August 19, 2011 FROM NEXTGOV arrow The Internal Revenue Service glossed over computer security in planning for a new tax return law that applies to e-payment processors, government investigators said. The law kicks in during the 2012 filing season for the 2011 tax year. A tiny provision folded into the 2008 Housing and Economic Recovery Act...

Investigation reveals widespread insider hacking at immigration agency

August 18, 2011 FROM NEXTGOV arrow A yearlong probe into computer fraud at an immigration application processing center uncovered multiple incidents of internal hacking where staff accessed management-level emails and other confidential files, according to Homeland Security Department interviews, network analyses and internal emails obtained by Nextgov. The investigation began in January 2008, when officials at...

From Nextgov: Investigation reveals widespread insider hacking at immigration agency

August 18, 2011 A yearlong probe into computer fraud at an immigration application processing center uncovered multiple incidents of internal hacking where staff accessed management-level emails and other confidential files, according to Homeland Security Department interviews, network analyses and internal emails obtained by Nextgov. Read the whole story at Nextgov.com.

A decade after Sept. 11 attacks, Homeland Security leaders reflect on progress

August 17, 2011 FROM NEXTGOV arrow Homeland Security Secretary Janet Napolitano on Wednesday looped industry leaders into the See Something, Say Something messaging campaign by showing them new public service announcements for their company websites. The public awareness movement, which was launched by the New York Metropolitan Transportation Authority and now is ubiquitous in the Washington...

Foreign Contractors Can Check Employment Eligibility Online

August 16, 2011 FROM NEXTGOV arrow Foreigners who aspire to work for federal contractors can now use a Spanish-language website to make sure their correct immigration status is on file with the government before their employers are required to do so -- avoiding potential unemployment. All personnel doing business with the government must pass muster with...

Dangerous Liaisons

August 15, 2011 FROM NEXTGOV arrow Let's start with the fundamental lapse that started this mess--the Defense Department designed the underpinnings of the Internet to make information easy to swap, not easy to secure. Now, efforts to add protections often complicate information sharing. For instance, in an effort to prevent another WikiLeaks-like episode, where an employee...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

    Download
  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download
  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

    Download
  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.

    Download

When you download a report, your information may be shared with the underwriters of that document.