AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1601-1610 of 2710

From Nextgov: E-neighborhood watch program spreads to half of states

July 22, 2011 A law enforcement program designed to function like a nationwide e-neighborhood watch is now providing half of U.S. states with an information sharing capability that did not exist before 2001, according to a Homeland Security Department assessment of compliance with the 9/11 commission recommendations on the 10th anniversary of the...

Social networking patterns help snag bank fraud suspects

July 21, 2011 FROM NEXTGOV arrow The hardest part of untangling a web of organized cyber crime associated with the password-swiping Zeus virus is not the malicious code, but the thieves' scattered locations, FBI officials said Wednesday afternoon. The officials drew this conclusion from one successful attempt last fall to arrest about 92 people suspected of...

Administration seeks to fill gaps in privacy protections

July 21, 2011 FROM NEXTGOV arrow The Obama administration has proposed the first-ever privacy safeguards for protecting the personal information of citizens that is handled by federal computing systems. The National Institute of Standards and Technology specifications fill gaps in existing information security procedures that date back to 2003, such as the need to offer members...

Pentagon official worries about implications of British hacking scandal

July 20, 2011 FROM NEXTGOV arrow The British phone hacking scandal demonstrates the need for fortified consumer smartphones that block call interceptions, said the U.S. Joint Chiefs of Staff vice chairman, noting that the Pentagon pays a pretty pound for such technology today. While there is no evidence that reporters at the now-defunct News of the...

From Nextgov: Pentagon official worries about implications of British hacking scandal

July 20, 2011 The British phone hacking scandal demonstrates the need for fortified consumer smartphones that block call interceptions, said the U.S. Joint Chiefs of Staff vice chairman, noting that the Pentagon pays a pretty pound for such technology today. Read the whole story at Nextgov.com.

Government scolded for data breach notification delays

July 18, 2011 FROM NEXTGOV arrow The Obama administration in recent weeks has recommended that companies move more quickly to alert customers when their personal data is compromised. Now internal auditors are recommending the federal government listen to its own advice. In a report released Thursday, the Treasury Inspector General for Tax Administration dinged the IRS...

New FBI biometric database will help feds nab undocumented immigrants

July 18, 2011 FROM NEXTGOV arrow The federal government plans to use an upgraded FBI biometric database to identify dangerous undocumented immigrants for possible deportation more quickly and accurately, according to internal agency documents. The FBI is in the process of transitioning from its existing Integrated Automated Fingerprint Identification System to the Next -Generation Identification system...

Securing Critical Networks

July 18, 2011 FROM NEXTGOV arrow It seems every day we learn about a new intrusion into government or civilian networks. Likewise, the plans and proposals to thwart such threats are multiplying. The White House released two strategies earlier this year -- one civilian and one international -- that attempt to carve a path forward in...

From Nextgov: New FBI biometric database will help feds nab undocumented immigrants

July 18, 2011 The federal government plans to use an upgraded FBI biometric database to identify dangerous undocumented immigrants for possible deportation more quickly and accurately, according to internal agency documents. Read the full story on Nextgov.

DHS' failure to leverage large technology buys costs billions in lost savings

July 15, 2011 FROM NEXTGOV arrow The Homeland Security Department did not routinely attempt to slash costs for equipment through bulk purchasing, especially for billions of dollars' worth of explosive detection tools, according to the DHS inspector general. For instance, various Homeland Security agencies individually bought $170 million worth of small X-ray machines, metal detectors, and...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.