AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1661-1670 of 2669

Cellphone may have signaled bin Laden's location

May 2, 2011 FROM NEXTGOV arrow While details remain sketchy on the operation that took down the man who set in motion the Sept. 11 terrorist attacks, some former U.S. cyber-forensic officials said a cellphone slip-up last year by one of Osama bin Laden's middlemen may have confirmed earlier tip-offs as to his whereabouts. Federal agents...

Cyber crooks cash in on Osama bin Laden's death

May 2, 2011 FROM NEXTGOV arrow Within hours of the announcement that Osama bin Laden was dead, online security vendors began reporting incidents of spammers and scammers exploiting the news. Major world events, including the recent Japanese earthquake, typically are accompanied by an increase in fraudulent emails designed to ensnare those seeking to help or obtain...

From Nextgov.com: Cellphone may have signaled bin Laden's location

May 2, 2011 While details remain sketchy on the operation that took down the man who set in motion the Sept. 11 terrorist attacks, some former U.S. cyber-forensic officials said a cellphone slip-up last year by one of Osama bin Laden's middlemen may have confirmed earlier tip-offs as to his whereabouts. Read the...

Into the Budget Morass

May 1, 2011 A delayed project to improve immigration processing is pulling resources and morale off course. Imagine a technology implementation plan designed at the outset to make federal employees' jobs easier, protect taxpayers' interests and serve customers more quickly. That was the idea behind the U.S. Citizenship and Immigration Service's Transformation program....

DHS probing Sony PlayStation network attack

April 29, 2011 FROM NEXTGOV arrow The Homeland Security Department, charged with protecting the nation's critical infrastructure, is helping to mitigate the damage from a breach of customer account data on Sony's online video game and entertainment networks that could have affected 77 million users, DHS officials said. Over a three-day period last week, intruders hacked...

From Nextgov.com: DHS probing Sony PlayStation network attack

April 29, 2011 The Homeland Security Department, charged with protecting the nation's critical infrastructure, is helping to mitigate the damage from a breach of customer account data on Sony's online video game and entertainment networks that could have affected 77 million users, DHS officials said. Read the whole story at Nextgov.com.

Dispute over future online travel agency may leave departments stranded

April 27, 2011 FROM NEXTGOV arrow Protests against the government's solicitation for a new online travel booking system could push the purchasing time frame beyond the 2013 expiration of its current e-travel contract, resulting in a service disruption or higher costs for agencies, people familiar with the protest process said. The Government Accountability Office on Friday...

NASA and USAID sign geospatial accord

April 25, 2011 FROM NEXTGOV arrow The heads of NASA and the U.S. Agency for International Development on Monday signed a pact to share more satellite data and mapping tools with international partners for disaster response. One of the programs slated for expansion under the agreement harnesses satellite imagery to generate maps and other visual depictions...

Bing's Most Popular Cyber Job Titles (Out of 822)

April 22, 2011 FROM NEXTGOV arrow Chief Information Security Officer and IT Security Engineer are among the most popular cybersecurity-related job titles, while Information Security Assurance Analyst is perhaps one of the less acceptable names, according to a Bing search engine analysis performed by security consultant Lenny Zeltser. Zeltser writes on his blog that he conducted...

Attack on Energy lab computers was isolated and limited, officials say

April 22, 2011 FROM NEXTGOV arrow A recent cyberattack against the Energy Department's Oak Ridge National Laboratory excised scientific, nonsensitive data from a collaborative work tool, according to lab officials. Federal law enforcement and intelligence officers, in coordination with Homeland Security Department officials, are analyzing the source of the so-called advanced persistent threat, which currently seems...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by eSignLive by VASCO

    Mobile E-Signatures for Government

    Learn 5 key trends that accelerate government demand for mobile signing.

    Download
  • Sponsored by Management Concepts

    SPONSORED: Successful Change Management Practices in the Public Sector

    How governmental agencies implement organizational change management.

    Download
  • Sponsored by Kronos

    Solving the Workforce Compliance Challenge

    Download this eBook to learn how data and automation can help state and local agencies.

    Download

When you download a report, your information may be shared with the underwriters of that document.