AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1631-1640 of 2710

From Nextgov: DHS debuts Energy Star-like system for software security

June 27, 2011 The Homeland Security Department and consulting firm Mitre Corp. on Monday unveiled a system for rating the protection of software products to help agencies, contractors and consumers ensure they are buying safe technology, in the same way the Energy Star labeling program helps guarantee eco-friendly purchases, DHS officials said. Read...

New House GOP task force to weigh Obama cyber proposal by Oct.

June 24, 2011 FROM NEXTGOV arrow House GOP leaders on Friday announced the creation of a Republican task force that will evaluate the White House's recent proposal for far-reaching cybersecurity reforms. Senate leaders support most of the Obama administration's 52-page draft legislation, but House Republicans have not taken a public stance on many of the issues,...

White House proposal could open computer networks to insider threats

June 24, 2011 FROM NEXTGOV arrow A White House cybersecurity proposal that requires auditors to evaluate the protection of critical networks could actually make those networks more vulnerable by opening them to new insider threats, an industry group representing many federal technology contractors said Friday. Lawmakers currently are evaluating draft legislation from the Obama administration that,...

From Nextgov: White House proposal could open computer networks to insider threats

June 24, 2011 A White House cybersecurity proposal that requires auditors to evaluate the protection of critical networks could actually make those networks more vulnerable by opening them to new insider threats, an industry group representing many federal technology contractors said Friday. Read the whole story at Nextgov.com

FBI teams with 11 countries to unmask scareware ringleaders

June 23, 2011 FROM NEXTGOV arrow FBI officials coordinated with nearly a dozen countries to squelch two cyber gangs that netted $74 million by downloading viruses onto more than 1 million victims' computers and then threatening to erase their hard drives unless they purchased pricy fixes. The shakedown on purveyors of "scareware" is one of several...

White House agrees to let Congress codify some cybersecurity policies

June 22, 2011 FROM NEXTGOV arrow Obama administration officials say they will let Congress make permanent in statute some cybersecurity policies the White House initially had wanted the executive branch to authorize, to more quickly implement the law. The White House in May distributed to lawmakers 52 pages of text for consideration as part of a...

Banks urged to get faster at reporting cyber breaches

June 21, 2011 FROM NEXTGOV arrow An industry group representing the largest financial institutions said banks hit by cyber intrusions should immediately notify federal officials and affected customers, amid controversy over Citigroup's decision to wait weeks before informing account holders of a significant breach. The White House recently introduced legislative language that would allow a much...

From Nextgov: Banks urged to get faster at reporting cyber breaches

June 21, 2011 An industry group representing the largest financial institutions said banks hit by cyber intrusions should immediately notify federal officials and affected customers, amid controversy over Citigroup's decision to wait weeks before informing account holders of a significant breach. Read the full story on Nextgov.

LulzSec Hacktivists Declare War on .Gov Websites; Feds Stand Ready

June 20, 2011 FROM NEXTGOV arrow Following hacker group LulzSec's call for war on all government websites, the Homeland Security Department, which protects U.S. private and civilian agency networks, said DHS is proceeding with work to secure .gov networks in response to emerging online threats. The group of unidentified pranksters on Monday claimed responsibility, in a...

Treasury seeks brainy search engine to help follow terrorist money

June 20, 2011 FROM NEXTGOV arrow The Treasury Department is searching for a supersmart search engine to spot signs of terrorist-financing and money laundering among monetary transactions totaling 9 terabytes of data -- the equivalent of a stack of typewritten pages nearly 460 miles high. Treasury's intelligence arm, the Financial Crimes Enforcement Network, or FinCEN, has...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

    Download
  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download
  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

    Download
  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.

    Download

When you download a report, your information may be shared with the underwriters of that document.