AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 81-90 of 2277

Hackers Block Animal Shelter Donations, Pose As Cute Syrian Rebels on Skype, and Bust Into HipChat

February 6, 2015 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: UMass Memorial Ex-Employee Takes Off With Billing Data on Up To 14,000 Patients The UMass Memorial Medical Group has learned a former staffer allegedly accessed private information that contained credit card and debit ...

Need a Job? Cyber Command Is Halfway Full

February 6, 2015 FROM NEXTGOV arrow The Pentagon is at the midway point of staffing a projected 6,000-person Cyber Command, officials said, amid fears of a catastrophic threat to U.S. networks. The military appears to be backing away from a long-held goal of establishing a full force by 2016. Lt. Col. Valerie Henderson, a Pentagon spokeswoman, ...

Exclusive: OPM Monitoring Anthem Hack; Feds Might Be Affected

February 5, 2015 FROM NEXTGOV arrow The Office of Personnel Management is keeping a close eye on details emerging about a hack at the second biggest U.S. health insurer, Anthem Inc., which provides coverage to 1.3 million federal employees. Anthem runs the Blue Cross-Blue Shield Service Benefit Plan, better known as the Federal Employee Program, or ...

The Pentagon Wants To Expand Its Cyber Forces

February 4, 2015 The military services each want to bring on board an additional 20 to 60 computer security whizzes starting next fall to fill the ranks of a 6,000-person Cyber Command, according to President Barack Obama's fiscal 2016 funding request. Air Force Maj. Gen. James Martin earlier this week said that increases ...

Pentagon Proposes At Least $27M to Grow Ranks of Cyber Forces

February 4, 2015 FROM NEXTGOV arrow The military services each want to bring on board an additional 20 to 60 computer security whizzes starting next fall to fill the ranks of a 6,000-person Cyber Command, according to President Barack Obama's fiscal 2016 funding request. Air Force Maj. Gen. James Martin earlier this week said that increases ...

Is Obama's $14 Billion Cybersecurity Request Enough?

February 3, 2015 The White House's overall commitment to fighting hackers in the federal sphere tallies up to $14 billion. That’s how much President Barack Obama has asked for from lawmakers to help protect all U.S. networks from threat actors -- a 10 percent increase over his fiscal 2015 total cyber proposal, acting ...

Obama Budget: How Far Does $14 Billion In Cyber Spending Go?

February 3, 2015 FROM NEXTGOV arrow The White House's overall commitment to fighting hackers in the federal sphere tallies up to $14 billion. That’s how much President Barack Obama has asked for from lawmakers to help protect all U.S. networks from threat actors -- a 10 percent increase over his fiscal 2015 total cyber proposal, acting ...

White House Debuts Dot-Gov Cyber Enforcement Squad

February 2, 2015 FROM NEXTGOV arrow Editor's note: This story has been updated to reference the timetable around data breach notification. The Obama administration will spend about $20 million on a new White House cyber unit to oversee dot-gov network security, including, for the first time, making sure agencies notify victims of breaches according to a ...

US Visitor Surveillance System Brings Some Solace to Families of MH17 Victims

January 30, 2015 FROM NEXTGOV arrow A Department of Homeland Security database that warehouses the fingerprints of almost all foreign visitors to catch terrorists recently was used for a different purpose -- bringing closure to bereft families. U.S. authorities checked the system’s records against residual, or “latent,” prints left behind at the Malaysia Airlines Flight 17 ...

Hackers Redirect Malaysia Airlines, Pop Taylor Swift’s Twitter Account, and Harass Autistic Teen

January 30, 2015 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Autistic Boy Commits Suicide after Virus Accuses Him of Illicit Online Activity The tragedy began when Joseph Edwards received a fake police email, claiming – wrongly -- that he had been looking at ...