AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1841-1850 of 2710

Homeland Security kills secure border tech program

January 14, 2011 FROM NEXTGOV arrow The Homeland Security Department has killed its beleaguered $1.1 billion program to control U.S. land borders with a virtual fence made up of surveillance tools, Secretary Janet Napolitano announced on Friday, after briefing Congress on her review of the Secure Border Initiative network program. DHS officials had encountered major cost,...

From Nextgov.com: Homeland Security kills secure border tech program

January 14, 2011 The Homeland Security Department has killed its beleaguered $1.1 billion program to control U.S. land borders with a virtual fence made up of surveillance tools, Secretary Janet Napolitano announced on Friday, after briefing Congress on her review of the Secure Border Initiative network program. Read the full story on Nextgov.com.

DHS IG Skinner to Leave Office

January 13, 2011 FROM NEXTGOV arrow Homeland Security Inspector General Richard Skinner, who has probed contractor waste at the department since its inception, announced on Thursday that he will step down March 1. Prior to his July 2005 Senate confirmation as IG, Skinner -- a four-decade veteran of the federal government -- had held the position...

State official: WikiLeaks poses a threat to human rights

January 13, 2011 FROM NEXTGOV arrow During a briefing Thursday on the declining state of civil liberties worldwide, including freedom of the press, a top State Department official said the publishing of diplomatic cables on the Internet has posed a threat to human rights. "Whether whatever you're reading is real or not, there is clearly a...

Tracing Transparency

January 13, 2011 FROM NEXTGOV arrow As the second anniversary of President Obama's open government initiative approaches, the overwhelming sentiment among citizens is that public officials aren't being frank with them. And if trust translates to transparency that means federal agencies haven't even come close to peeling back the onion, judging from their scores in a...

Automation touted as central to repairing the immigration system

January 12, 2011 FROM NEXTGOV arrow The government can fix the immigration system without legislation, by automating visa processing and by granting priority to skilled workers, including technology professionals, over family members, according to a new report by the Brookings Institution. "The infrastructure for considering and granting visas needs a major upgrade," Darrell M. West, founder...

Leahy Sets Cyber Privacy Agenda

January 11, 2011 FROM NEXTGOV arrow Sen. Patrick Leahy, chairman of the Judiciary Committee, on Tuesday unveiled an ambitious agenda for changing the country's privacy laws to keep pace with the digital age. The committee will continue where it left off last session in revising the 1986 Electronic Communications Privacy Act to balance law enforcement's need...

International cybersecurity treaty might not be achievable, report says

January 11, 2011 FROM NEXTGOV arrow An international treaty to establish regulations for computer security might be unattainable, according to a new report by the EastWest Institute think tank. "It could take years to arrive at a global treaty on cybersecurity, since many states are not ready for it -- and perhaps never will be," concludes...

White House Open Gov Post Vacant

January 10, 2011 FROM NEXTGOV arrow The White House official overseeing the president's transparency initiative stepped down last week to return to her teaching post at New York Law School, Obama administration officials said Monday. A replacement has not been named. The departure of Beth Noveck, deputy chief technology officer, coincides with the second anniversary of...

Kundra Encourages Open Source...& Proprietary

January 7, 2011 FROM NEXTGOV arrow White House officials on Friday sent agency chief information officers and senior procurement executives a memo directing them to weigh open source options when buying technology. Open source refers to technology based on nonproprietary parts, which allow third-party developers to improve and modify the product without having to pay the...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.