AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 1221-1230 of 1372

Outgoing federal CIO speculates on his legacy

July 14, 2011 FROM NEXTGOV arrow If information technology and entrepreneurship were sufficiently leveraged then within a decade development competitions could be as big a part of federal spending as standard procurement processes are now, Federal Chief Information Officer Vivek Kundra said Thursday. "We spend about half-a-trillion dollars on contracts and grants [annually]," Kundra said. "Imagine...

From Nextgov: Outgoing federal CIO speculates on his legacy

July 14, 2011 If information technology and entrepreneurship were sufficiently leveraged then within a decade development competitions could be as big a part of federal spending as standard procurement processes are now, Federal Chief Information Officer Vivek Kundra said Thursday. Read the whole story at Nextgov.com.

Harvard Study Under Fire for Facebook Mining

July 13, 2011 FROM NEXTGOV arrow To the list of organizations struggling to adapt to the new social media world, add social science researchers and their institutional review boards. A massive project to collect data on Harvard's graduating class of 2009 has been put on hold after questions arose about the researchers' use of semi-privileged student...

States didn't cooperate on Medicaid data repository, official says

July 13, 2011 FROM NEXTGOV arrow The Health and Human Services Department missed its 2010 deadline to roll all Medicare and Medicaid claims information into a single, integrated data repository because of limited cooperation and a mishmash of data forms at the state level, officials told lawmakers Tuesday. The integrated data repository, which was launched in...

Kundra names task force to consolidate federal websites

July 12, 2011 FROM NEXTGOV arrow Federal Chief Information Officer Vivek Kundra named a 17-member task force on Tuesday to winnow the government's massive Web presence over the next several months and to update government policies for what justifies a new website or domain. The White House also released a list of 1,759 top-level federal Web...

IG: Corporate e-filing saves money but doesn't reduce unnecessary audits

July 12, 2011 FROM NEXTGOV arrow A six-year-old mandate requiring large corporations to file their tax returns electronically has cut costs for businesses and the government, but could have raised the number of unnecessary audits the government performs, according to a watchdog report released publicly Tuesday. Most of the government savings from the corporate e-file program...

National Archives' first Wikipedian in residence to bring more holdings to the public

July 11, 2011 FROM NEXTGOV arrow In January 1874, early feminist icon Susan B. Anthony petitioned Congress to remit a fine she'd received for illegally voting in the 1872 presidential election, 47 years before the 19th Amendment gave women the franchise. Until recently, anyone hoping to read that petition would have been limited to a few...

From Nextgov: National Archives' first Wikipedian to bring more to the public

July 11, 2011 In January 1874, early feminist icon Susan B. Anthony petitioned Congress to remit a fine she'd received for illegally voting in the 1872 presidential election, 47 years before the 19th Amendment gave women the franchise. Until recently, anyone hoping to read that petition would have been limited to a few...

Rulemaking on 911 Texts Coming Soon, FCC Says

July 8, 2011 FROM NEXTGOV arrow Legwork is complete on the first draft of regulations implementing a "next-generation 9-1-1" system that can accept text messages, a Federal Communications Commission official told lawmakers Friday, adding that commissioners' approval is all that is needed. "I know it's very high on the chairman's list and on the commissioners' lists,...

DHS and ACLU Dispute Electronic Border Searches in Court

July 8, 2011 FROM NEXTGOV arrow The Homeland Security Department will defend border agents' unlimited authority to search U.S. citizens' laptops, digital cameras and other electronic devices in a federal courthouse in Brooklyn this afternoon. The lawsuit, brought by the American Civil Liberties Union in 2010, charges that such unlimited search authority violates citizens' Fourth Amendment...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.