AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 121-130 of 1746

At 7 Years Old, CYBERCOM Becomes a Full Combatant Command

August 18, 2017 President Donald Trump elevated U.S. Cyber Command to a full combatant command Friday, marking a crucial transition for the 7-year-old military unit that’s scheduled to reach full operating capability next year. The elevation was authorized in the most recent version of an annual defense policy bill in November and CYBERCOM...

Trump Order Elevates Cyber Command

August 18, 2017 FROM NEXTGOV arrow President Donald Trump elevated U.S. Cyber Command to a full combatant command Friday, marking a crucial transition for the 7-year-old military unit that’s scheduled to reach full operating capability next year. The elevation was authorized in the most recent version of an annual defense policy bill in November and CYBERCOM...

Dems Want Proof FCC Net Neutrality Page Was Actually Attacked

August 17, 2017 FROM NEXTGOV arrow Two Democratic lawmakers want a government watchdog to investigate the Federal Communications Commission’s claim that malicious hackers forced it offline in May. FCC officials attributed the blackout of a site collecting comments about a net neutrality proposal to malicious hackers who overloaded the site with requests—what’s known as a distributed...

Election Commission Wants to Work with DHS on Election Cybersecurity

August 16, 2017 FROM NEXTGOV arrow The Homeland Security Department made a unilateral move to raise its involvement in the cybersecurity of U.S. election infrastructure last year, but a commission that helps state and local election commissioners wants to turn DHS’ decision to its advantage. The Election Assistance Commission’s plan is to query state and local...

NIST Releases Updated Cyber and Privacy Guidance Draft

August 15, 2017 FROM NEXTGOV arrow The government’s cybersecurity standards agency published a draft version of a major revision to its guidance on security and privacy controls for government and industry Tuesday. Among other changes, the new document better integrates privacy and cyber controls, and better syncs those controls with recommendations in the National Institute of...

More Bad News from IRS About Taxpayer Info Security

August 14, 2017 FROM NEXTGOV arrow The IRS is still failing to adequately protect U.S. taxpayers’ personal information and sensitive financial data, according to an audit report announced Monday. The Government Accountability Office is not releasing the text of the report because it contains either classified or sensitive but unclassified information, the auditor said. The title...

CYBERCOM Plans Industry Day in October

August 11, 2017 FROM NEXTGOV arrow U.S. Cyber Command will hold its first ever industry day Oct. 27 in Springfield, Va., a CYBERCOM official confirmed to Nextgov Friday. The program for the industry day is still developing and more details will be coming out shortly, a CYBERCOM spokesman said. » Get the best federal technology news...

How Arcane Budget Rules Threaten Government Cybersecurity

August 11, 2017 FROM NEXTGOV arrow Why is it so tough to raise funding for civilian government cyber protections? You can blame the White House and Congress, but a portion of the responsibility lies with the Pentagon too. House appropriators hinted at this explanation in the committee report for their Homeland Security appropriations bill. Their funding...

This Web-Building Tool is the Target of Civilian Government’s First Bug Bounty

August 9, 2017 FROM NEXTGOV arrow A government-friendly website building tool is the first target for a General Services Administration program that recruits freelance cybersecurity researchers to root out vulnerabilities in government tech systems. GSA’s Technology Transformation Service loosed a select group of invite-only ethical hackers on its Federalist web building platform earlier this year and...

7 Ways to Fill Cyber Workforce Gaps in a Generation

August 8, 2017 FROM NEXTGOV arrow Here’s the downside to all the job-easing and time-saving technologies proliferating across government, industry and commerce: There aren’t nearly enough skilled workers to make sure that technology is secure. The U.S. is facing a shortfall of nearly 300,000 cybersecurity workers, according to government funded research. The global cybersecurity workforce shortage...