AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1771-1780 of 2710

During vendor switch, DHS reverts to an old system for posting future business opportunities

March 11, 2011 FROM NEXTGOV arrow The Homeland Security Department is temporarily reverting to a system of forms to publish forecasted federal business opportunities on the Internet, after losing access to a data entry website. The DHS Advance Acquisition Plan site, previously powered by a system called FIDO.gov, was akin to a calculated wish list of...

GAO upholds contractor protest of DHS financial system award

March 10, 2011 FROM NEXTGOV arrow The Government Accountability Office this week overturned the Homeland Security Department's award of a departmentwide financial management system to CACI, sources familiar with GAO's decision told Nextgov. GAO spokesman Chuck Young confirmed the agency's decision in an e-mail. The audit agency is recommending that DHS issue a revised solicitation that...

Administration excoriated for delay in proposing cyber plan

March 9, 2011 FROM NEXTGOV arrow A Senate Democrat blasted the Obama administration for holding up passage of cybersecurity legislation that has been subjected to a more than yearlong interagency review process. At a congressional hearing on Wednesday, Sen. Sheldon Whitehouse, D-R.I., secured a commitment from the Homeland Security Department secretary, under oath, to provide him...

U.S. might be giving away sensitive military technology, report finds

March 8, 2011 FROM NEXTGOV arrow Sensitive military technology might be slipping into enemy hands, in part because of a dramatic decline in the number of foreign workers that the Commerce Department screens, federal auditors have found. For national security purposes, the United States controls the export of so-called dual-use technologies -- items that have both...

From Nextgov: U.S. might be giving away sensitive military technology, report finds

March 8, 2011 Sensitive military technology might be slipping into enemy hands, in part because of a dramatic decline in the number of foreign workers that the Commerce Department screens, federal auditors have found. Read the whole story on Nextgov.com.

CIA website disruption may have been work of a prankster

March 7, 2011 FROM NEXTGOV arrow Federal officials as of Monday afternoon were still investigating the cause of a Thursday cyber incident that knocked offline the public website of the CIA and its unclassified e-mail system. Some cyber experts say the disruption may have been caused by a denial of service attack perpetrated by pranksters to...

From Nextgov: CIA website disruption may have been work of a prankster

March 7, 2011 Federal officials as of Monday afternoon were still investigating the cause of a Thursday cyber incident that knocked offline the public website of the CIA and its unclassified e-mail system. Read the whole story on Nextgov.com.

Agriculture to shift all workers to the cloud by year's end

March 4, 2011 FROM NEXTGOV arrow Aiming to have its entire workforce using computer services in the cloud by the end of the year, the Agriculture Department is moving inboxes and other business applications for about 10,000 employees each month from in-house systems to the Web, Chief Information Officer Chris Smith said on Friday. Dollars freed...

Interim spending law contains cut in cybersecurity funds

March 3, 2011 FROM NEXTGOV arrow Congress agreed to eliminate $20 million for network security programs in the major bill to keep the government operating through March 18, as the Republican-controlled House and Democratic-led Senate began negotiations on further cuts for the rest of the fiscal year ending in September. The short-term continuing resolution signed into...

Industry group forms cloud commission to advise White House

March 2, 2011 FROM NEXTGOV arrow An industry group with a record of shaping federal information technology policy has established a cloud computing commission to advise the White House on outsourcing more than $20 billion worth of IT services to the Web. TechAmerica Foundation on Wednesday announced that the board will be co-chaired by the heads...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.