AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1651-1660 of 2710

From Nextgov: FEMA watchdog endorses data mining to uncover overpayments

June 10, 2011 Federal inspectors are calling for the Federal Emergency Management Agency to employ data mining software -- similar to that used by the board monitoring stimulus spending-- for preventing future losses, now that the agency is saddled with recovering about $643 million worth of potential overpayments for housing assistance. Read the...

Experts recommend an international code of conduct for cyberwar

June 9, 2011 FROM NEXTGOV arrow The United States and foreign countries should broker a code of conduct for offensive cyber actions that bans knocking out banking, power and other critical infrastructure networks except when nations are engaged in war, some former U.S. defense and intelligence officials said. Their recommendation follows the White House's release of...

Chief of the Year: Information Security

June 9, 2011 On June 15, Government Executive is featuring the government's chief officers of finance, human capital, information and information security in a special issue of the magazine. This year, for the second time, we've identified individuals to highlight as Chiefs of the Year. In challenging times, these individuals are leading the...

Cyber Defender Richard Clarke Advises Weapons Protection Tech Firm

June 8, 2011 FROM NEXTGOV arrow Former White House counterterrorism adviser and cybersecurity doomsayer Richard A. Clarke is now advocating a new technology federal agencies are using to trace a different kind of threat -- weapons and other objects of destruction. Visible Assets, Inc., manufacturer of RuBee wireless-tracking networks, announced on Tuesday that the author of...

General Dynamics snags a $1 billion networking contract for DHS' consolidated headquarters

June 7, 2011 FROM NEXTGOV arrow The General Services Administration awarded General Dynamics a roughly $1 billion networking contract for a new Homeland Security Department headquarters facility, after the government backed out of a $2.6 billion deal with Northrop Grumman Corp. for the project last year. Officials at GSA, which is administering the contract on behalf...

From Nextgov: General Dynamics snags $1 billion networking contract for DHS headquarters

June 7, 2011 The General Services Administration awarded General Dynamics a roughly $1 billion networking contract for a new Homeland Security Department headquarters facility, after the government backed out of a $2.6 billion deal with Northrop Grumman Corp. for the project last year. Read the whole story at Nextgov.com.

New guidelines require agencies to document progress automating surveillance of cyber threats

June 6, 2011 FROM NEXTGOV arrow The Homeland Security Department has released new information security guidance that, for the first time, requires agencies to report on progress installing tools that continuously monitor threats to computer networks. Agencies annually are required to document their compliance with technology safeguards laid out in the 2002 Federal Information Security Management...

Airport body scans to get less personal by early 2012

June 3, 2011 FROM NEXTGOV arrow The Transportation Security Administration expects to mask full-body images on about half its 500 passenger screening machines nationwide by the end of the year and upgrade the rest shortly thereafter, the agency's top official said Thursday evening. TSA began ramping up the rollout of 1,000 whole-body advanced imaging technology scanners...

From Nextgov: Airport body scans to get less personal by early 2012

June 3, 2011 The Transportation Security Administration expects to mask full-body images on about half its 500 passenger screening machines nationwide by the end of the year and upgrade the rest shortly thereafter, the agency's top official said Thursday evening. Read the full story on Nextgov.

Former federal contractor gets jail time for falsifying immigration records

June 2, 2011 FROM NEXTGOV arrow A former contractor working as a records custodian at U.S. Citizenship and Immigration Services has been sentenced to five and a half years in jail for doctoring computer files to help illegal aliens obtain "legal" passports, Justice Department officials announced this week. The case reflects a larger problem the agency...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.