AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1721-1730 of 2710

Cyber identity strategy would eliminate the need for multiple passwords

April 15, 2011 FROM NEXTGOV arrow The White House on Friday unveiled guiding principles for industry on developing identity credentials that would allow ID holders to log on to virtually any website, eliminating the need to remember multiple passwords or to enter personal information. The 52-page National Strategy for Trusted Identities in Cyberspace, first suggested in...

Budget deal hits trade-tracking program as key technologies are slated to come online

April 15, 2011 FROM NEXTGOV arrow The budget battle took a $6 million chunk of funding out of a cargo screening program and delayed the purchase of mobile radios for Border Patrol agents, Customs and Border Protection officials said. The compromise spending bill to fund government operations through September, which President Obama was set to sign...

From Nextgov.com: Cyber identity strategy would eliminate the need for multiple passwords

April 15, 2011 The White House on Friday unveiled guiding principles for industry on developing identity credentials that would allow ID holders to log on to virtually any website, eliminating the need to remember multiple passwords or to enter personal information. Read the whole story on Nextgov.com.

U.S. law enforcement agencies struggle to detect cyberattack sponsors

April 13, 2011 FROM NEXTGOV arrow Most computer crimes originate in Russia and other Eastern European countries, according to U.S. law enforcement officers, but officials do not have the capability to pinpoint whether such attacks are sponsored by criminal enterprises or nation states, they told Senate lawmakers on Tuesday. Easy, cheap access to the Internet, particularly...

Budget deal threatens government cloud security clearances

April 12, 2011 FROM NEXTGOV arrow A program aimed at curbing federal information technology costs by expediting security certifications for shared, so-called clouds might be a victim of the latest round of budget cuts, technology officials familiar with funding conversations said. A proposed $35 million e-government account that supports FedRAMP, the cloud security effort, was gutted...

From Nextgov.com: Budget deal threatens government cloud security clearances

April 12, 2011 A program aimed at curbing federal information technology costs by expediting security certifications for shared, so-called clouds might be a victim of the latest round of budget cuts, technology officials familiar with funding conversations said. Read the whole story at Nextgov.com.

Congress, administration grapple with cyber defense authority

April 11, 2011 FROM NEXTGOV arrow The head of the military unit overseeing cyberspace reaffirmed that the U.S. Cyber Command cannot monitor civilian networks, noting its powerlessness over systems outside the .mil domain might require congressional action. "I do not have the authority to look at what's going on in other government sectors, nor what would...

From Nextgov.com: Congress, administration grapple with cyber defense authority

April 11, 2011 The head of the military unit overseeing cyberspace reaffirmed that the U.S. Cyber Command cannot monitor civilian networks, noting its powerlessness over systems outside the .mil domain might require congressional action. Read the whole story at Nextgov.com.

No Shutdown Reporting Reprieve for Stimulus Fund Recipients

April 8, 2011 FROM NEXTGOV arrow While perhaps not critical to the protection of life and property, the economic stimulus-tracking website Recovery.gov is exempt from the government shutdown. The site, which will be updated later this month, is funded through 2009 Recovery Act appropriations -- not the annual agency appropriations that Congress is debating today. A...

Lawmaker: TSA should supply screening technology to foreign countries

April 8, 2011 FROM NEXTGOV arrow Transportation Security Administration experts have traveled the globe to train foreign aviation officials in countries that lack resources, but TSA is not allowed to offer surplus security technology to those nations, say some lawmakers who see the limitation as a threat to the U.S. supply chain and public safety. "One...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    View
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    View
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    View
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    View
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    View
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    View
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    View

When you download a report, your information may be shared with the underwriters of that document.