AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 1241-1250 of 1372

Obama Twitter Town Hall Gets Off to Snarky Start

June 30, 2011 FROM NEXTGOV arrow The conversation about President Obama's first Twitter town hall got off to a classic social media start Thursday with re-tweets, thumbs ups, spoilers and snark drowning out most real conversation. "Let me kick things off... I #AskObama whether it is a good idea to attempt to conduct political discourse in...

Iranian Revolutionary Guard Blasts Internet in a Suitcase

June 30, 2011 FROM NEXTGOV arrow The so-called Internet in a suitcase -- a State Department-funded project to sneak stealth satellite Internet capacity to dissidents in autocratic states -- has drawn the attention of the Iranian regime. The Islamic Republic's powerful Revolutionary Guards denounced the project in the most recent issue of "Sobhe Sadegh," its weekly...

British government's massive website reduction took years

June 30, 2011 FROM NEXTGOV arrow The British government's Web presence was a mess in 2006, with more than 2,000 sites -- no one knew precisely how many -- spawned with scant central oversight and little rhyme or reason about how they were organized, a top official told Nextgov. "Citizens [couldn't] tell the difference between one...

From Nextgov: British government's massive website reduction took years of work

June 30, 2011 The British government's Web presence was a mess in 2006, with more than 2,000 sites -- no one knew precisely how many -- spawned with scant central oversight and little rhyme or reason about how they were organized, a top official told Nextgov. Read the full story on Nextgov.

Voters Used Social Media in 2010 Midterm

June 29, 2011 FROM NEXTGOV arrow More than one fifth of all American internet users over the age of 18 used social media sites to get involved in the 2010 midterm elections or to investigate a candidate, a study released Monday said. Of the roughly 75 percent of adult Americans who go online, 8 percent posted...

Crowd Pleasers v. Policy Heft

June 28, 2011 FROM NEXTGOV arrow It's "frustrating" that serious policy videos the Obama administration pushes on the White House website and blog garner nowhere near as much public attention as crowd-pleasing videos ready-made for Youtube, White House New Media Director Macon Phillips told a think tank audience Tuesday. A recent White House video of a...

GSA to Launch Gov App Challenges Discussion

June 28, 2011 FROM NEXTGOV arrow The General Services Administration's Office of Citizen Services on Wednesday will begin publishing a list of 10 challenges facing federal agencies developing a mobile presence, the division's mobile director said Tuesday. The office will publish one challenge online each day, along with an open forum for agencies to discuss the...

White House considers new social media avenues

June 28, 2011 FROM NEXTGOV arrow White House communications staffers are investigating using social media sites beyond Facebook and Twitter to broaden the Obama administration's public engagement and, perhaps, to communicate in different ways, a White House aide said Tuesday. That investigation is driven partly by a belief that social media changes so rapidly the government...

Stealth Internet helps get images, messages out of troubled areas, but proves less useful for protests

June 28, 2011 FROM NEXTGOV arrow Advanced technology that keeps dissidents online during state-sponsored Internet blackouts can help the rest of the world stay informed about and engaged in a faraway struggle against an autocratic regime, but it may be less useful at keeping protest movements on track, analysts told Nextgov. Technology such as the "Internet...

U.S. Leads in Google User Data Requests

June 27, 2011 FROM NEXTGOV arrow The U.S. government made more than 4,600 requests to Google to hand over user data in the second half of 2010, more than twice as many requests as the next highest-requesting nation, according to a transparency report from the search giant. The UK, France, India and Brazil were the only...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.