AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 1-10 of 1375

Bill to Elevate CYBERCOM Heads to Obama’s Desk

1:14 PM ET FROM NEXTGOV arrow A major defense policy bill that elevates U.S. Cyber Command to a full combatant command is on its way to President Barack Obama’s desk after the Senate voted overwhelmingly for passage Thursday. The move will raise the profile of CYBERCOM as lawmakers urge the Pentagon to play a more active...

Justice Department to Propose ‘Legislative Fix’ to Warrants for Data Stored Abroad

12:53 PM ET FROM NEXTGOV arrow The Justice Department plans to propose a “legislative fix” to guarantee U.S. judges can issue warrants for digital data stored abroad, Assistant Attorney General Leslie Caldwell said Thursday. The department has long argued the Stored Communications Act allows law enforcement to seek warrants from U.S. judges for customer data stored...

Trump May Be on Collision Course with Congress over Russian Hacking

12:34 PM ET National security leaders in Congress could be headed for conflict with President-elect Donald Trump when it comes to Russian hacking. Republican and Democratic lawmakers called for consequences for Russia’s hacking of Democratic political officials and probing of state election sites Wednesday. In a Time magazine interview unveiled the same day,...

Trump May Be on Collision Course with Congress over Russian Hacking

December 7, 2016 FROM NEXTGOV arrow National security leaders in Congress could be headed for conflict with President-elect Donald Trump when it comes to Russian hacking. Republican and Democratic lawmakers called for consequences for Russia’s hacking of Democratic political officials and probing of state election sites Wednesday. In a Time magazine interview unveiled the same day,...

Top Dems Seek Full Congress Briefing on Russian Election Hacks

December 6, 2016 FROM NEXTGOV arrow Obama administration intelligence officials should give a classified briefing to all members of Congress on Russian efforts to meddle in the 2016 presidential election, the House’s top national security Democrats said Tuesday in a letter to President Barack Obama. The rare full congressional briefing is necessary because of the threat...

Commerce Secretary to Industry: Don’t Let Cyber Report Collect Dust

December 6, 2016 FROM NEXTGOV arrow Commerce Secretary Penny Pritzker threw her voice Tuesday behind efforts to ensure a slate of cybersecurity proposals released this month lasts beyond the end of the Obama administration. Pritzker called on industry representatives to “ensure these recommendations are not just considered but that they are enacted and implemented” and to...

Cyber Commission Hopes to Brief Trump Before Christmas

December 5, 2016 FROM NEXTGOV arrow A commission that recommended sweeping updates to the nation’s cybersecurity protections hopes to brief President-elect Donald Trump’s transition team on its findings before Christmas, the group’s executive director said Monday. That will increase the likelihood the incoming administration can take action on many recommendations from the Obama-appointed Commission on Enhancing...

DOJ Takes Down Cyber Criminal Network That Cost Hundreds of Millions

December 1, 2016 FROM NEXTGOV arrow The Justice Department and Pennsylvania prosecutors are working with police from more than 40 nations to take down a worldwide cyber criminal network called Avalanche, the department said Thursday. The operation includes arrests and searches in five countries and blocking more than 800,000 malicious internet domains, according to a news...

The NSA-Cyber Command Divorce Is Inching Closer to Reality

December 1, 2016 The final draft of an annual defense policy bill, released Wednesday, elevates U.S. Cyber Command to a full combatant command and sets strict conditions before it can be split from its sister intelligence agency, the National Security Agency. CYBERCOM has been run in a “dual hat” system by the NSA...

White House Plans to Retire Outdated Cyber Regulations

December 1, 2016 FROM NEXTGOV arrow White House cyber officials have identified 63 different policy directives, regulations or other requirements they plan to retire, the government’s chief information security officer said Wednesday. Some of the directives slated for retirement date back to the 1990s, CISO Gregory Touhill told an audience at the FireEye Cyber Defense Summit....

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.