AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1751-1760 of 2710

From Nextgov.com: NSA testing smartphones, tablets on safe mobile architecture

March 25, 2011 The National Security Agency is testing a new mobile infrastructure, largely composed of commercial tools, to secure Top Secret information on portable devices, such as smartphones and tablet computers, a high-level NSA official said. Read the whole story on Nextgov.com

Pentagon seeks $3.2 billion for revised cyber budget

March 24, 2011 FROM NEXTGOV arrow Protecting military networks in fiscal 2012 would cost nearly $1 billion more than the Pentagon publicly reported last month, an increase that reflects the growing number of programs being re-categorized as cybersecurity-related, agency officials said. When the Obama administration released its 2012 budget in mid-February, the Pentagon announced it was...

From Nextgov.com: Pentagon seeks $3.2 billion for revised cyber budget

March 24, 2011 Protecting military networks in fiscal 2012 would cost nearly $1 billion more than the Pentagon publicly reported last month, an increase that reflects the growing number of programs being re-categorized as cybersecurity-related, agency officials said. Read the whole story at Nextgov.com.

Wyden seeks to clarify when government can track mobile data

March 23, 2011 FROM NEXTGOV arrow Forthcoming proposed restrictions on government's ability to track the location of possible criminal suspects through mobile devices could have the unintended consequence of deterring federal authorities from legally using such location-based data to save lives, say law enforcement technology experts. Concerns about privacy have prompted lawmakers, civil rights groups and...

From Nextgov.com: Wyden seeks to clarify when government can track mobile data

March 23, 2011 Forthcoming proposed restrictions on government's ability to track the location of possible criminal suspects through mobile devices could have the unintended consequence of deterring federal authorities from legally using such location-based data to save lives, say law enforcement technology experts. Read the full story on Nextgov.com.

Agencies Look to the Cloud for Help with Digital ID Requirement

March 22, 2011 FROM NEXTGOV arrow Some agencies are turning to cloud computing providers to fulfill a requirement that they install smart card readers on all federal facilities by October. The Obama administration recently clamped down on enforcement of the 2004 Homeland Security Presidential Directive 12 that requires federal employees and contractors possess IDs embedded with...

RSA security breach compromised federal network ID tool

March 21, 2011 FROM NEXTGOV arrow A product many federal employees use to log on to computers and networks should be regarded as compromised, due to the infiltration of key information about the application during a cyberattack against manufacturer RSA, some security experts said. The Homeland Security Department -- the civilian agency that oversees commercial and...

From Nextgov.com: RSA security breach compromised key federal networks, expert says

March 21, 2011 A product many federal employees use to log on to computers and networks should be regarded as compromised, due to the infiltration of key information about the application during a cyberattack against manufacturer RSA, some security experts said. Read the whole story at Nextgov.com.

DHS, Agencies Take Precautions In Wake of RSA Breach

March 18, 2011 FROM NEXTGOV arrow The Homeland Security Department is coordinating with agencies to ensure federal networks are not compromised by a cyber attack Thursday that hit computer security contractor RSA, DHS officials said Friday. On Thursday, RSA reported an intrusion that stole information related to an RSA product, SecurID, that its customers use to...

Cyberattacks against federal networks were up 40 percent in 2010

March 18, 2011 FROM NEXTGOV arrow The number of attacks against federal networks increased nearly 40 percent last year, while the number of incidents targeting U.S. computers overall was down roughly 1 percent for the same period, according to a new White House report to Congress on federal computer security. "Malicious code through multiple means," such...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.