AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1671-1680 of 2710

Covert Payment Biz Captures Online Gambling Sites

May 23, 2011 FROM NEXTGOV arrow Immigration and Customs Enforcement agents seized 10 online gambling websites, after gaming companies allegedly processed illegal payments through an undercover U.S.-based Internet business the feds propped up to ensnare the culprits. Here's how the operation went down, federal officials announced Monday night: In the fall of 2009, a cooperating online...

Obama cybersecurity enforcement plan could backfire, senator warns

May 23, 2011 FROM NEXTGOV arrow A key lawmaker assessing a White House bill to strengthen cybersecurity warned that the proposal's plan for policing critical commercial networks -- by disclosing audits of their security practices -- could inadvertently steer U.S. adversaries to vulnerable targets. "The evaluation of that [company's security] plan would be publicly accessible," Sen....

DISA Dishes on Cyber Contractors

May 20, 2011 FROM NEXTGOV arrow Here's what the Pentagon's Defense Information Systems Agency really thinks about cybersecurity contractors: "What we don't love so much is once [you] get that foot in the door, we're pulled in and held hostage. Keep in mind the idea that as you win contracts and you get DoD business, don't...

Tighter Defense budget may mean tighter cybersecurity

May 20, 2011 FROM NEXTGOV arrow President Obama's quest to shave $400 billion off the Pentagon's budget by 2023 may have the positive effect of forcing the services to eliminate redundant cybersecurity programs and combine networks Defensewide, senior Pentagon officials said Friday. Budget analysts say the department's 2012 proposal for spending $3.2 billion on information assurance...

Interior center inadvertently exposes personal data of thousands of SEC employees

May 19, 2011 FROM NEXTGOV arrow An Interior Department payroll processing center that provides services to several agencies unintentionally exposed the full names and Social Security numbers of nearly 4,000 Securities and Exchange Commission employees earlier this month, according to Interior officials. On May 4, a customer support contractor inadvertently replied to a routine question from...

Reitinger's departure was not unexpected

May 19, 2011 FROM NEXTGOV arrow Philip Reitinger, the Homeland Security Department's lead computer security official, checked off key tasks on DHS' to-do list before settling on June 3 as the date he will step aside to spend the summer with his young children, say sources familiar with his thinking. Besides negotiating new authorities for DHS...

From Nextgov: Interior center inadvertently exposes personal data of SEC employees

May 19, 2011 An Interior Department payroll processing center that provides services to several agencies unintentionally exposed the full names and Social Security numbers of nearly 4,000 Securities and Exchange Commission employees earlier this month, according to Interior officials. Read the full story on Nextgov.com.

U.S. border agents to snag drug-smuggling jets with Canadian military radar

May 18, 2011 FROM NEXTGOV arrow The Homeland Security Department this fall plans to employ military-grade radar feeds from Canada to spot low-altitude aircraft smuggling drugs, but officials have not stationed any license-plate cameras to catch vehicles carrying the cash that funds such illicit flights. While drug trafficking is more prevalent along the southern border than...

From Nextgov.com: U.S. border agents to snag drug-smuggling jets with Canadian military radar

May 18, 2011 The Homeland Security Department this fall plans to employ military-grade radar feeds from Canada to spot low-altitude aircraft smuggling drugs, but officials have not stationed any license-plate cameras to catch vehicles carrying the cash that funds such illicit flights. Read the whole story at Nextgov.com.

DHS accused of hiding fingerprinting data

May 17, 2011 FROM NEXTGOV arrow Plaintiffs in a Freedom of Information Act lawsuit contend the Homeland Security Department is attempting to hide information on a controversial immigrant fingerprinting program by refusing to release court-ordered email trails. Under the program, called Secure Communities, officials check the digital fingerprints of people booked by local law enforcement against...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.