AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1851-1860 of 2704

Feds may weigh changes to information security requirements

January 5, 2011 FROM NEXTGOV arrow Before a military employee allegedly leaked a mountain of classified documents to WikiLeaks, reportedly by downloading data to a music CD, the White House had been in the middle of updating rules on reporting agency network weaknesses. Obama officials have not said whether they will revise the reporting guidelines further...

U.S.-Qatar pact aims to strengthen aviation screening

January 4, 2011 FROM NEXTGOV arrow Homeland Security Secretary Janet Napolitano and the Qatar government have reached an accord on information sharing that includes coordinating cybersecurity and body scanning strategies to thwart al Qaeda, according to a letter of intent released on Tuesday. The United States and Qatar will "promote increased partnership with the DHS and...

Labor looks to contractor for more help with financial management

January 3, 2011 FROM NEXTGOV arrow The Labor Department plans to award a noncompetitive contract for additional help with its new financial management system to Global Computer Enterprises, a firm already supporting the modern, cloud-like setup that it installed under a $50 million deal last year. Labor contracting officers intend to enter a fixed-price pact for...

Tracing Transparency

January 1, 2011 President Obama's open government initiative unleashed a torrent of agency data, but citizens still don't believe they're getting the whole story. As the second anniversary of President Obama's open government initiative approaches, the overwhelming sentiment among citizens is that public officials aren't being frank with them. And if trust translates...

The best and worst in federal IT, 2010 edition

December 30, 2010 FROM NEXTGOV arrow What were the best federal IT initiatives of 2010? According to industry officials: -- A 25-point strategy for simplifying and speeding system installations that relies on a shift to cloud computing -- Web-based applications that agencies can lease and share. -- A myth-busters campaign to dispel the belief that agency...

HP Clinches $2.5B NASA Deal for PCs

December 28, 2010 FROM NEXTGOV arrow Hewlett Packard has nabbed a 10-year NASA megadeal potentially worth $2.5 billion to manage employees' personal computers and peripheral technology, space agency officials announced on Monday. The job entails providing, securing and servicing most staff computers, agency software, mobile technology services, printers and other supporting infrastructure. Herndon, Va.-based HP Enterprise...

McAfee: Coming cyber threats to target mobile devices, official secrets

December 28, 2010 FROM NEXTGOV arrow The biggest cyber threats in 2011 are expected to include, among other new risks, malicious applications on mobile devices and attacks aimed at stealing government secrets and sabotaging business operations, according to McAfee. The computer security firm annually issues a list predicting what will be the biggest cyber scares during...

U.S. Time Capsule Opens, Online

December 27, 2010 FROM NEXTGOV arrow The National Archives and Records Administration just opened a door to what the agency expects will become a sort of time capsule containing U.S. historical materials that future generations will be able to access irrespective of innovations in technology. A prototype of Online Public Access, which launched Monday, lets average...

Whistleblower Bill: Fire WikiLeaks Perps

December 22, 2010 FROM NEXTGOV arrow A whistleblower protection bill for federal workers that stalled before Congress adjourned would have allowed defense intelligence employees to be fired for compromising national security, aka posting classified material on the anti-secrets website WikiLeaks. More precisely, unlike other federal personnel, they would not be protected against retaliation from certain high-ranking...

Lawmakers say cybersecurity is a top priority in 2011

December 22, 2010 FROM NEXTGOV arrow Cybersecurity will be a top priority for the Republican-led House in 2011, but it is unknown when Congress will act on legislation to revamp an outdated federal cyber law, say aides to incoming GOP leaders. Details likely will emerge when Mac Thornberry, R-Texas, the new vice chairman of the Armed...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

    Download
  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download
  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

    Download
  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.

    Download

When you download a report, your information may be shared with the underwriters of that document.