AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 71-80 of 2641

Doxed ISIS Fighters, Leaked Complaints about Uber Rapes and 2.2M Cancer Patients Exposed to ID Theft

March 14, 2016 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: ISIS Defector Doxes 22,000 Terrorists Tens of thousands of extremists are named in files that were passed on to Sky News in a memory stick. The data was stolen from the head of...

Dems Question Secret Service’s 'Monitoring' of Threats Involving Trump Events

March 14, 2016 FROM NEXTGOV arrow Two House Democrats on Friday evening said they are asking the Department of Homeland Security about monitoring techniques in play to protect Donald Trump, other presidential candidates and citizens from increasingly hostile behavior at campaign events. The announcement came hours before Trump called off a rally in Chicago amid violence,...

Could a Name Change Clarify What DHS' Cyber Team Actually Protects?

March 10, 2016 FROM NEXTGOV arrow The head of the National Protection and Programs Directorate has been urging Congress to change the office’s name to something that specifies what it does. The new, preferred title, “Cyber and Infrastructure Protection Agency,” might provide employees with the clear sense of identity and mission that she told House lawmakers...

Federal Agencies are Using Last Summer’s ‘Cyber Sprint’ to Justify Sole-Source IT Contracts

March 9, 2016 FROM NEXTGOV arrow Several federal agencies are not letting eligible companies compete for IT contracts, reasoning that only a current or other favored supplier can handle work demanded by a 30-day cybersecurity exercise. But that exercise was supposed to have ended last July, and some of these so-called sole-source contracts issued by the...

CORRECTED: The Ransomware Threat to Agencies

March 7, 2016 FROM NEXTGOV arrow Editor’s Note: This story has been corrected and revised. The claim that the FBI and the Department of Homeland Security have paid off hackers to remove malicious software from their systems, as described in a new report from the Institute for Critical Infrastructure Technology, is not accurate, according to one...

Hackers Take Special Ed Students’ Secrets, Book Marriott Hotel Room, and Deceive Snapchat Payroll Employee

March 7, 2016 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Stolen Laptop Held Data on Hundreds of Md. Special Ed Students The machine was taken from WestEd, a nonprofit organization that had assisted Montgomery County, Maryland, school system officials with a review of...

FAA Working on New Guidelines for Hack-Proof Planes

March 4, 2016 FROM NEXTGOV arrow The Federal Aviation Administration has begun shaping cybersecurity regulations for airplane manufacturers, amid warnings that the criss-crossing of onboard networks poses risks to flight safety. Researchers have been invited to build upon an FAA-developed framework for testing a plane’s susceptibility to hacks, agency officials announced on a federal contracting site....

Pentagon Launches First-of-Its-Kind Bug Bounty Program

March 3, 2016 Challenged by hackers and staffing shortages, the Pentagon is inviting plainclothes techies to a competition where they can poke around military code for security bugs. The idea is to find and fix vulnerabilities unknowingly inserted in software before the bad guys do. The contest draws inspiration from "bug bounty" programs...

‘Hack the Pentagon’: Will DOD’s Bug Bounty Program Attract Top Talent?

March 2, 2016 FROM NEXTGOV arrow Challenged by hackers and staffing shortages, the Pentagon is inviting plainclothes techies to a competition where they can poke around military code for security bugs. The idea is to find and fix vulnerabilities unknowingly inserted in software before the bad guys do. The contest draws inspiration from "bug bounty" programs...

House Panel Wants to Give Agency CIOs Authority to Crack Down on Personal Email Use

March 1, 2016 FROM NEXTGOV arrow Lawmakers on Tuesday advanced legislation that would let federal agencies stop employees from accessing personal email and other online programs or using personal devices for security purposes -- without consulting unions. The measure stems from recent incidents at the Department of Homeland Security and the Office of Personnel Management, where...