AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 21-30 of 1412

Pentagon Wants More Cyber Threat Info from Contractors in 2017

December 22, 2016 FROM NEXTGOV arrow The Defense Department plans to gather more information from contractors about cyber threats during the 2017 fiscal year, according to a governmentwide regulatory agenda released Thursday. The Pentagon’s fiscal 2017 regulatory wish list includes finalizing a rule that requires defense contractors with security clearances to report network breaches to DOD...

House Report: 'Serial Fabricator' Snowden Talks to Russian Spy Agencies

December 22, 2016 FROM NEXTGOV arrow National Security Agency leaker Edward Snowden is a serial fabricator who may be spilling secrets to Russian intelligence service, rather than a principled whistleblower, according to a House Intelligence Committee report released today. The heavily redacted bipartisan report does not offer proof of its claim that Snowden has been in...

NIST Wants Help ‘Future-Proofing’ Data Security

December 21, 2016 FROM NEXTGOV arrow The government’s standards agency is asking for the public’s help keeping encryption secure from super-powerful next-generation computers. The initiative’s goal is to “future proof” digital information from quantum computers trying to break encryption algorithms, according to the request from the National Institute of Standards and Technology posted Tuesday in the...

Don’t Undermine Encryption, Bipartisan Congressional Report Warns

December 20, 2016 FROM NEXTGOV arrow Congress should not pass laws that weaken encryption, according to a bipartisan congressional report released today. That’s true even though encryption technology can make it harder for law enforcement and intelligence agencies to combat crime and terrorism, according to the report ordered in March by Republican and Democratic leaders of...

Police Use of Phony Cellphone Towers Needs to be Reined in, Lawmakers Warn

December 20, 2016 FROM NEXTGOV arrow Congress should pass legislation to ensure that phony cellphone towers police use to locate criminals and fugitives are used consistently across the country, according to a bipartisan congressional report released Monday. In the absence of those laws, the Justice and Homeland Security departments should refuse to approve the sale of...

Pressure Mounts on McConnell for Special Committee on Russian Election Hacks

December 19, 2016 FROM NEXTGOV arrow Pressure mounted over the weekend on Senate Majority Leader Mitch McConnell to appoint a special committee to investigate charges of Russian election hacking. A bipartisan quartet of senators called on the majority leader to appoint a special investigatory committee in a Sunday letter, arguing that following regular Senate procedure could...

You Don’t Need to Catch Hackers in the Act, but Cyber Attribution is Hard

December 19, 2016 FROM NEXTGOV arrow President-elect Donald Trump is on offense against the intelligence community’s conclusion that the Russian government meddled in the U.S. election, declaring intel officials are in the tank for Democrats and there’s no way to know much of anything in cyberspace unless you catch a hacker in the act. Trump’s wrong,...

House Cyber Leader Calls for Special Cyber Committee

December 16, 2016 FROM NEXTGOV arrow One of the Congress’ top cyber advocates on Friday called on House Speaker Paul Ryan to create a special cybersecurity committee that would lead an investigation into Russian hacks aimed at disrupting the 2016 election. The proposed select committee would cut across jurisdictional lines to “investigate pressing cybersecurity matters, starting...

What Hackers Want More Than Cash When They Report Bugs

December 15, 2016 FROM NEXTGOV arrow It’s more important for most internet security researchers that companies stay in regular contact with them about fixing the hackable vulnerabilities they find in software systems than the companies pay them for the bug reports, a federal agency reported Thursday. Only about one-fifth of internet security researchers, known as white-hat...

White House Cyber Adviser: I Wish We Saw Election Hacking Coming

December 15, 2016 FROM NEXTGOV arrow Russian cyber meddling in the 2016 U.S. presidential election was an “almost inevitable” evolution of international conflict in cyberspace, and it won’t be the last time a nation uses hacking to disrupt a U.S. election, White House cyber adviser Michael Daniel predicted Thursday. Daniel defended the government response to Russian...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.