AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 41-50 of 2115

EXCLUSIVE: New Connect.gov Aims to Consolidate Your Passwords

September 15, 2014 FROM NEXTGOV arrow With high-profile hacks exposing the futility of passwords, alternatives such as biometric identification and two-step verification are gaining popularity. Waiting in the wings is a login network that could grant users access to many of their Internet accounts with a single registration. The National Strategy for Trusted Identities in Cyberspace ...

Hackers Blackmail Bitcoin Inventor, Corrupt Brazilian Newspaper

September 12, 2014 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Hacker Holds Mysterious Bitcoin Inventor’s Identity for Ransom A person going by the name “Jeffrey” has usurped an email account belonging to the virtual currency’s secretive founder, Satoshi Nakamoto, saying he will sell ...

Skyping Fake Bomb Threats in the Name of ISIS Not a Wise Move

September 12, 2014 FROM NEXTGOV arrow U.S. authorities have charged a 21-year-old Connecticut resident for his involvement in false VoIP calls warning of impending violence against Americans, according to a newly unsealed FBI affidavit. Matthew Tollis was arrested Wednesday on federal accusations of "swatting," the practice of calling 911 to elicit a SWAT team or other ...

Things Can Go Kaboom When a Defense Contractor's 3-D Printer Gets Hacked

September 11, 2014 FROM NEXTGOV arrow Defense companies that manufacture parts with three-dimensional printers using metal powders might want to heed forthcoming government-issued standards for preventing hacks. Not only can attackers steal proprietary designs by breaching the machines’ data files – but they can also cause physical damage to production plants and employees. "A compromise may ...

Why QR Code Readers Could Replace Pen-and-Paper Signatures at Some Agencies

September 10, 2014 FROM NEXTGOV arrow While Apple foresees consumers soon charging their groceries with the tap of an iPhone, Verizon is banking on federal agency employees soon being able to sign confidential contracts with the tap of any smartphone. The telecommunications giant – the first firm certified to offer high-level online identity protection for federal ...

Report: Agencies Aren’t Properly Vetting All Cyber Contractors

September 9, 2014 FROM NEXTGOV arrow Vendors operating systems that handle government data are required to take security precautions, but most agencies are not making sure they do so. That is the finding of the latest federal audit of agency cybersecurity. The deficiency is significant because contract employees make up a third of the total federal ...

Around Government

September 9, 2014 Bravery in the Bureaucracy Making the right decision isn’t the hard part, agency leaders say, it’s having the guts to follow through. By Charles S. Clark Newscaster Dan Rather was famous in the 1980s for signing off the evening news with a simple word: courage. He may have been onto ...

WH Official: Cyber Coverage Will Be a Basic Insurance Policy By 2020

September 8, 2014 FROM NEXTGOV arrow By 2020, private firms will be buying cybersecurity insurance when they sign up for product liability coverage and other basic policies, a top White House cyber official said Monday. There isn't a market for cyber insurance yet — not for lack of interest, but because of the lack of data ...

Would Pay Scales Close the Cybersecurity Workforce Gap?

September 7, 2014 Federal agencies have long struggled to fill positions in the ever-growing ranks of the cybersecurity workforce. But a question going back to at least 2011 remains unanswered: Should the feds create a job category and salary scale for government cybersecurity workers -- or is the profession too mercurial to assign ...

Hackers Uncover Pakistanis’ Finances, Bug Korean Hacks and Exploit Celebs

September 7, 2014 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Hacktivists release banking information of Pakistani officials Attackers calling themselves the ASOR Hack Team dumped what they claim is a list of banking data belonging to about 23,000 residents and officials in Pakistan. ...