Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 31-40 of 1368

Best Practices Out Soon to Connect Companies, Ethical Hackers

November 7, 2016 FROM NEXTGOV arrow A task force charged with opening communication lines between manufacturers and researchers who discover hackable vulnerabilities in their systems hopes to release draft guidance for comment in the next couple months, members said Monday. Members of the Cybersecurity Vulnerabilities Multistakeholder Process agreed to release their various reports for public comment...

The Next President Will Face a Cyber Crisis. Here's How to Handle It

November 7, 2016 FROM NEXTGOV arrow The next U.S. president will face a cyber landscape of unparalleled complexity with little time or flexibility to bring it under control. Begin with a federal government proved unable to defend itself against breaches at the White House, State Department, Joint Chiefs of Staff and the Office of Personnel Management....

Governors Defend Election Infrastructure Amid Hacking Fears

November 4, 2016 FROM NEXTGOV arrow The nation’s governors are confident Tuesday’s election won’t be thwarted by cyberattacks, according to a statement today from top leaders of the National Governors Association. The statement stressed both the intense cyber testing of voting systems and the decentralized nature of U.S. voting systems, which would make it extremely difficult...

How Many Zero-Days Does the US Government Hold? Here’s the Best Guess Yet

November 4, 2016 The U.S. government likely retains an arsenal of just dozens of otherwise unknown computer vulnerabilities that can be used for spying or sabotage and adds fewer than 10 new vulnerabilities to that cache each year, according to a Columbia University analysis released today. The analysis gives some context to the...

Report: Government’s Zero Days Arsenal is in the Dozens

November 3, 2016 FROM NEXTGOV arrow The U.S. government likely retains an arsenal of just dozens of otherwise unknown computer vulnerabilities that can be used for spying or sabotage and adds fewer than 10 new vulnerabilities to that cache each year, according to a Columbia University analysis released today. The analysis gives some context to the...

Government’s Auditor Passes Own IT Audit

November 2, 2016 FROM NEXTGOV arrow The government auditor that has savaged the Internal Revenue Service, the Food and Drug Administration and other agencies for poor information security practices passed its own review with flying colors today. The review by the Government Accountability Office’s inspector general focused on GAO’s procedures to wipe sensitive data off defunct...

Cyber Workforce: A Compound Noun Meaning the Folks Protecting Your Networks

November 2, 2016 FROM NEXTGOV arrow A Commerce Department office focused on cybersecurity education released an updated guidance document today aimed at getting government and industry speaking a common language when it comes to the cybersecurity workforce. The Cybersecurity Workforce Framework divides cybersecurity work into seven broad categories that include over 50 work roles with tasks,...

GAO Plans OPM, FedRAMP Audits in 2017

November 1, 2016 FROM NEXTGOV arrow A top question for government cyber auditors next year will be whether the Office of Personnel Management has shored up the information security weaknesses that led to a massive breach of personnel information in 2015. A report examining OPM’s efforts to mitigate, detect and combat cyber intrusions is likely to...

Task Force Urges Loosening Reins on Hacking Victims to Fight Back

October 31, 2016 FROM NEXTGOV arrow The U.S. government should clarify the ways private companies can respond to cyber breaches, including sometimes allowing them to compromise attackers’ networks, according to a report from academics and private sector officials published today. Such “active defense” measures begin with sharing information about adversaries, luring those adversaries with misinformation and...

New Rule Takes Handcuffs Off Ethical Hackers

October 28, 2016 FROM NEXTGOV arrow A new rule takes taking effect today expanding protections for white hat hackers—security researchers who disclose the software vulnerabilities they uncover to manufacturers or to the public rather than exploiting them. Advocates say the change will lead to more ethical hackers finding dangerous flaws in the software underlying cars, medical...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.