AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 1021-1030 of 1372

It's apps vs. mobile-enabled websites in GSA smackdown

December 12, 2011 FROM NEXTGOV arrow Agencies looking to push their content onto mobile platforms are better off building mobile-enabled websites that can be accessed from any smartphone or tablet than building native apps that live only on one particular platform, Neil Bonner, a mobile specialist at the Transportation Security Administration, said recently. Unlike native apps,...

Clinton Condemns Spy Software Sales to Syria

December 9, 2011 FROM NEXTGOV arrow Secretary of State Hillary Clinton criticized Western technology companies suspected of selling surveillance technology to Syria and other repressive regimes in a speech on Internet Freedom Thursday, while acknowledging dual use technologies and third-party resellers sometimes make it difficult for tech companies to keep their hands clean. "When companies sell...

Federal CIO outlines shared services strategy

December 9, 2011 FROM NEXTGOV arrow Agencies must create a plan to move at least two agency-specific information technology services to shared interagency platforms by the end of 2012, according to the draft version of federal Chief Information Officer Steven VanRoekel's shared services strategy released Friday. The draft strategy also requires agency IT leaders to create...

IT project reviews have saved $4 billion since 2010, according to CIO

December 8, 2011 FROM NEXTGOV arrow This story has been updated. Federal agencies have saved nearly $4 billion in the past year through TechStat reviews that resulted in scaling back or canceling information technology projects that are over budget or delayed, officials said Thursday. The TechStat model, aimed at weeding out underperforming contracts, was launched by...

Federal IT Dashboard improving but still not wholly accurate

December 8, 2011 FROM NEXTGOV arrow Postings to the Office of Management and Budget's Federal IT Dashboard are more accurate and timely than 18 months ago, but they still aren't giving a perfectly clear picture of government information technology spending, according to a watchdog report released Wednesday. The Federal IT Dashboard ranks about 800 major IT...

State Launches Virtual Embassy Tehran

December 7, 2011 FROM NEXTGOV arrow The State Department launched Virtual Embassy Tehran, on Tuesday, a website officials hope will "work as a bridge between the American and Iranian people." The site can't perform most functions of a bricks and mortar embassy, such as issuing visas, Secretary of State Hillary Clinton said in a video message....

USDA plans internal app store in 2012

December 7, 2011 FROM NEXTGOV arrow The Agriculture Department is developing a mobile application it believes will cut in half the travel required of its Natural Resources Conservation Service employees working on projects to reduce chemical runoff at farms, an Agriculture official said Wednesday. The department also is working on a mobile app for veterinarians reporting...

Social media isn't a major path to radicalization

December 7, 2011 FROM NEXTGOV arrow Al Qaeda and other Muslim extremist groups are active on Facebook, YouTube and other social media, but that doesn't mean they're making much impact, experts testified before a House panel Tuesday. Internet discussions are a poor replacement for in-person extremist recruiting because they lack the same level of intimidation and...

If you think you'll save money with cloud computing, think again

December 6, 2011 FROM NEXTGOV arrow This article has been corrected to remove an error in the government’s cloud adoption timeline. More than half of organizational users saved little or no money after transitioning to cloud computing, according to a new study, and only 14 percent actually downsized their information technology departments after moving to the...

If you think you'll save money with cloud computing, think again

December 6, 2011 More than half of organizational users saved little or no money after transitioning to cloud computing, according to a new study, and only 14 percent actually downsized their information technology departments after moving to the cloud. The findings could concern federal IT officials who have said they would save roughly...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.