AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 1-10 of 1368

DOJ Takes Down Cyber Criminal Network That Cost Hundreds of Millions

December 1, 2016 FROM NEXTGOV arrow The Justice Department and Pennsylvania prosecutors are working with police from more than 40 nations to take down a worldwide cyber criminal network called Avalanche, the department said Thursday. The operation includes arrests and searches in five countries and blocking more than 800,000 malicious internet domains, according to a news...

The NSA-Cyber Command Divorce Is Inching Closer to Reality

December 1, 2016 The final draft of an annual defense policy bill, released Wednesday, elevates U.S. Cyber Command to a full combatant command and sets strict conditions before it can be split from its sister intelligence agency, the National Security Agency. CYBERCOM has been run in a “dual hat” system by the NSA...

White House Plans to Retire Outdated Cyber Regulations

December 1, 2016 FROM NEXTGOV arrow White House cyber officials have identified 63 different policy directives, regulations or other requirements they plan to retire, the government’s chief information security officer said Wednesday. Some of the directives slated for retirement date back to the 1990s, CISO Gregory Touhill told an audience at the FireEye Cyber Defense Summit....

House Homeland Chairman Braces for Jurisdiction Fight Next Congress

November 30, 2016 FROM NEXTGOV arrow House Homeland Security Chairman Michael McCaul, R-Texas, wants to wrest oversight of the Homeland Security Department from competing committees next Congress, he said Wednesday. The current jurisdictional system, which divvies up DHS oversight between numerous committees, is simply too complex to get needed reforms passed, McCaul said at the Bipartisan...

Compromise Defense Policy Bill Elevates Cyber Command

November 30, 2016 FROM NEXTGOV arrow The final draft of an annual defense policy bill, released Wednesday, elevates U.S. Cyber Command to a full combatant command and sets strict conditions before it can be split from its sister intelligence agency, the National Security Agency. CYBERCOM has been run in a “dual hat” system by the NSA...

Trump Appoints Legislative Cyber Leaders to Transition Team

November 30, 2016 FROM NEXTGOV arrow President-elect Donald Trump today named a trio of congressional cyber leaders to his transition team, including House Intelligence Chairman Devin Nunes, R-Calif. The appointments could give some indication of a serious cyber focus for the incoming Trump administration, whose cyber positions have been largely opaque. Trump pledged in a video...

Updated Intel Bill Mandates FBI Report on Cyber Recruiting

November 29, 2016 FROM NEXTGOV arrow An updated draft of a must-pass intelligence policy bill released Tuesday includes a mandate for the FBI to report on efforts to integrate cyber expertise into its investigations. The report, due to congressional intelligence committees in six months, should include clear benchmarks about efforts to recruit and retain agents with...

Fight Over FBI Hacking Powers Comes Down to the Wire

November 28, 2016 FROM NEXTGOV arrow A top Justice Department official pushed back Monday against critics of an FBI hacking powers expansion set to take effect Thursday, saying the critics are confusing substantive issues with procedural ones. The debate centers on an amendment to Rule 41 of the Federal Rules of Criminal Procedure, which would allow...

Election Security Expert Urges Paper Trail Audit

November 23, 2016 FROM NEXTGOV arrow President-elect Donald Trump’s upset victory over Hillary Clinton was “probably not” orchestrated by foreign hackers, a top election security expert said this morning. But state election officials should audit the election’s paper and digital trails regardless, said J. Alex Halderman, a professor of electrical engineer and computer science and director...

Under Trump, Tech Companies Brace for Fight Over Encryption

November 23, 2016 As Donald Trump fills out national security and law enforcement posts in his new cabinet, the future of encryption may hang in the balance. On the campaign trail, the president-elect was a committed foe of cop-proof encryption systems that shield customer communications even from the communications provider. Most prominently, he...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.