AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems for Nextgov. She has covered technology for nine years at such publications as National Journal's TechnologyDaily, Federal Computer Week and Forbes. Before joining Government Executive, she covered agriculture and derivatives trading for Congressional Quarterly. She has been a guest commentator on C-SPAN, WTOP and Federal News Radio. She is a graduate of the University of Pennsylvania.
Results 21-30 of 1925

Federal Cyber Hiring Could Take a Hit Under Marijuana Mandate

March 14, 2014 FROM NEXTGOV arrow The Obama administration’s policy to uphold a ban on federal employees smoking pot -- even where recreational marijuana is now legal under state law -- could snuff out efforts to hire nonconventional but trusted hackers to search for holes in government computer systems. Many of the best of these white ...

Cloud Security Frees Up NOAA's Workforce

March 13, 2014 FROM NEXTGOV arrow Sometimes consolidation can be a good thing for the federal workforce. Centralizing networks in the cloud has allowed human eyes at the National Oceanic and Atmospheric Administration to weed through 1.2 billion cyber transactions per day for signs of hacking. Typically, federal executives name cost and energy savings as the ...

75 Percent of Hospitals and Clinics Are Worried about HealthCare.gov Hacks

March 12, 2014 FROM NEXTGOV arrow A major concern about Obamacare is that the online swap of patient information between providers and the federal government's data hub will jeopardize consumers' privacy and security, according to a new study by the Ponemon Institute. As far as cyber threats that affect patients, "the Affordable Care Act (ACA) is ...

The Government Already Has the Technology to Monitor Cleared Employees

March 11, 2014 FROM NEXTGOV arrow The government for years has continuously, electronically surveilled the behavior of personnel in sensitive security positions and does not need a whole new system to catch the next leaker, a former top technology executive in the intelligence community said. His comments came as debate heats up about building new technology ...

Russia's Holding Back Cyber Capabilities in Ukraine

March 10, 2014 FROM NEXTGOV arrow There is a big difference between the known capabilities of Russian hackers -- such as cyber espionage -- and the debilitating software the country actually possesses, which could hamper U.S. efforts to predict Putin’s next move, say some security researchers. So, far Russia's alleged cyber operations amid unrest in Ukraine ...

Pentagon Tries Again on Cyber Intelligence-Sharing Contract

March 7, 2014 FROM NEXTGOV arrow The Defense Department will recompete a $26 million contract to support a classified cyber intelligence network, after federal attorneys determined the Pentagon failed to properly evaluate contractor proposals, Defense officials said late on Friday. The project in question involves a network that holds "signatures" of known cyber threats identified by ...

TSA Halts Testing on Technology to Screen Passengers' Online Data

March 7, 2014 FROM NEXTGOV arrow The Transportation Security Administration has called off -- for now -- live tests of technology that would expand background checks on airplane passengers to include analyses of their online presences. The idea was to have contractors analyze consumer data -- potentially including dating profiles and shopping histories -- on fliers ...

Four Federal Cyber Escapades to Watch For This Spring

March 5, 2014 FROM NEXTGOV arrow The Obama administration’s 2015 budget request hints at novel approaches to the cyber threat at civilian agencies and the Pentagon. Funding-related papers released on Tuesday to justify spending for congressional appropriators do not include the details. So, look for officials to color in the picture during House and Senate hearings ...

DHS Wants More Virtual Fence Funding

March 4, 2014 FROM NEXTGOV arrow Spending on border control equipment and surveillance would rise by $11 million, under President Obama's 2015 budget request, with the administration set to break ground on up to 50 surveillance towers in Arizona. Customs and Border Protection on Feb. 26 signed contractor EFW, Inc. on to the project, which could ...

DARPA Chip Aims to Secure Electronics Throughout the Supply Chain

March 3, 2014 FROM NEXTGOV arrow The Pentagon is experimenting with computer chips inside parts for defense systems and other electronics, such as iPhones, that would identify compromised or counterfeit components. The ID chips would self-destruct if outsiders replicate, or "reverse engineer," the chips to try to outsmart them. The four-year effort is expected to involve ...