AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1561-1570 of 2669

Social networking patterns help snag bank fraud suspects

July 21, 2011 FROM NEXTGOV arrow The hardest part of untangling a web of organized cyber crime associated with the password-swiping Zeus virus is not the malicious code, but the thieves' scattered locations, FBI officials said Wednesday afternoon. The officials drew this conclusion from one successful attempt last fall to arrest about 92 people suspected of...

Administration seeks to fill gaps in privacy protections

July 21, 2011 FROM NEXTGOV arrow The Obama administration has proposed the first-ever privacy safeguards for protecting the personal information of citizens that is handled by federal computing systems. The National Institute of Standards and Technology specifications fill gaps in existing information security procedures that date back to 2003, such as the need to offer members...

Pentagon official worries about implications of British hacking scandal

July 20, 2011 FROM NEXTGOV arrow The British phone hacking scandal demonstrates the need for fortified consumer smartphones that block call interceptions, said the U.S. Joint Chiefs of Staff vice chairman, noting that the Pentagon pays a pretty pound for such technology today. While there is no evidence that reporters at the now-defunct News of the...

From Nextgov: Pentagon official worries about implications of British hacking scandal

July 20, 2011 The British phone hacking scandal demonstrates the need for fortified consumer smartphones that block call interceptions, said the U.S. Joint Chiefs of Staff vice chairman, noting that the Pentagon pays a pretty pound for such technology today. Read the whole story at Nextgov.com.

Government scolded for data breach notification delays

July 18, 2011 FROM NEXTGOV arrow The Obama administration in recent weeks has recommended that companies move more quickly to alert customers when their personal data is compromised. Now internal auditors are recommending the federal government listen to its own advice. In a report released Thursday, the Treasury Inspector General for Tax Administration dinged the IRS...

New FBI biometric database will help feds nab undocumented immigrants

July 18, 2011 FROM NEXTGOV arrow The federal government plans to use an upgraded FBI biometric database to identify dangerous undocumented immigrants for possible deportation more quickly and accurately, according to internal agency documents. The FBI is in the process of transitioning from its existing Integrated Automated Fingerprint Identification System to the Next -Generation Identification system...

Securing Critical Networks

July 18, 2011 FROM NEXTGOV arrow It seems every day we learn about a new intrusion into government or civilian networks. Likewise, the plans and proposals to thwart such threats are multiplying. The White House released two strategies earlier this year -- one civilian and one international -- that attempt to carve a path forward in...

From Nextgov: New FBI biometric database will help feds nab undocumented immigrants

July 18, 2011 The federal government plans to use an upgraded FBI biometric database to identify dangerous undocumented immigrants for possible deportation more quickly and accurately, according to internal agency documents. Read the full story on Nextgov.

DHS' failure to leverage large technology buys costs billions in lost savings

July 15, 2011 FROM NEXTGOV arrow The Homeland Security Department did not routinely attempt to slash costs for equipment through bulk purchasing, especially for billions of dollars' worth of explosive detection tools, according to the DHS inspector general. For instance, various Homeland Security agencies individually bought $170 million worth of small X-ray machines, metal detectors, and...

Pentagon goes on the defensive with cyber strategy

July 14, 2011 FROM NEXTGOV arrow Pentagon officials on Thursday unveiled an unclassified version of a new cyber operations strategy that focuses on defensive protections, rather than offensive actions, to stem an ever increasing number of military network intrusions. "The thrust of this strategy is defensive. It is protecting the networks because those networks undergird all...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by eSignLive by VASCO

    Mobile E-Signatures for Government

    Learn 5 key trends that accelerate government demand for mobile signing.

    Download
  • Sponsored by Management Concepts

    SPONSORED: Successful Change Management Practices in the Public Sector

    How governmental agencies implement organizational change management.

    Download
  • Sponsored by Kronos

    Solving the Workforce Compliance Challenge

    Download this eBook to learn how data and automation can help state and local agencies.

    Download

When you download a report, your information may be shared with the underwriters of that document.