AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 1231-1240 of 1377

IG: Corporate e-filing saves money but doesn't reduce unnecessary audits

July 12, 2011 FROM NEXTGOV arrow A six-year-old mandate requiring large corporations to file their tax returns electronically has cut costs for businesses and the government, but could have raised the number of unnecessary audits the government performs, according to a watchdog report released publicly Tuesday. Most of the government savings from the corporate e-file program...

National Archives' first Wikipedian in residence to bring more holdings to the public

July 11, 2011 FROM NEXTGOV arrow In January 1874, early feminist icon Susan B. Anthony petitioned Congress to remit a fine she'd received for illegally voting in the 1872 presidential election, 47 years before the 19th Amendment gave women the franchise. Until recently, anyone hoping to read that petition would have been limited to a few...

From Nextgov: National Archives' first Wikipedian to bring more to the public

July 11, 2011 In January 1874, early feminist icon Susan B. Anthony petitioned Congress to remit a fine she'd received for illegally voting in the 1872 presidential election, 47 years before the 19th Amendment gave women the franchise. Until recently, anyone hoping to read that petition would have been limited to a few...

Rulemaking on 911 Texts Coming Soon, FCC Says

July 8, 2011 FROM NEXTGOV arrow Legwork is complete on the first draft of regulations implementing a "next-generation 9-1-1" system that can accept text messages, a Federal Communications Commission official told lawmakers Friday, adding that commissioners' approval is all that is needed. "I know it's very high on the chairman's list and on the commissioners' lists,...

DHS and ACLU Dispute Electronic Border Searches in Court

July 8, 2011 FROM NEXTGOV arrow The Homeland Security Department will defend border agents' unlimited authority to search U.S. citizens' laptops, digital cameras and other electronic devices in a federal courthouse in Brooklyn this afternoon. The lawsuit, brought by the American Civil Liberties Union in 2010, charges that such unlimited search authority violates citizens' Fourth Amendment...

FEMA and FCC commit to more training before implementing emergency mobile alerts

July 8, 2011 FROM NEXTGOV arrow Local emergency managers need more training before the nationwide rollout of an emergency-alert text messaging system, industry officials told a House panel Friday, warning that ill-considered texts about minor events could result in cell users not taking the alerts seriously. The Personal Localized Alert Network will be rolled out in...

Town Hall Tweets Did Reflect Tweeting Public...Sort of...

July 7, 2011 FROM NEXTGOV arrow Journalists really are different from people, as a latter-day Fitzgerald might have said. Or at least different from Tweeple. A Boston Globe study of questions Tweeted in advance of President Obama's first Twitter town hall found substantial differences from questions asked by journalists during the president's last few news conferences....

Did Twitter town hall bring something new to the table?

July 7, 2011 FROM NEXTGOV arrow A day after President Obama's first Twitter town hall, pundits and techies were still debating whether there was something new under the silicon or if the president had merely transferred his oratorical skills to a new platform -- one, incidentally, where questioners couldn't ask followups or be caught by cameras...

Pot Tops Tweets for Obama Town Hall

July 6, 2011 FROM NEXTGOV arrow With just an hour to go before President Obama's first-ever Twitter town hall, the most retweeted question under the #Ask Obama hashtag is whether he'd consider legalizing marijuana to lower the burden on U.S. courts and prisons and raise government revenue. Legalization, with nearly 5,000 retweets, is followed by questions...

Plenty of 140-character questions, few new answers in Obama's Twitter town hall

July 6, 2011 FROM NEXTGOV arrow After days of anticipation -- a long time in the Internet Age -- President Obama's first Twitter Town Hall on Wednesday ended up covering much of the same ground as a live town hall with the difference that questions were limited to 140 characters. The Twitter town hall, announced July...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.