AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 51-60 of 1523

Expect a Cyber Budget Boost But Stay Tuned for that Executive Order, Homeland Adviser Says

March 15, 2017 FROM NEXTGOV arrow President Donald Trump’s budget, due out Thursday, will include early indications of a broad plan to upgrade the security of federal networks, Trump’s top homeland security adviser said Wednesday. Don’t expect a multibillion-dollar investment that will modernize government cybersecurity in one fell swoop, though, Homeland Security Adviser Tom Bossert said...

White House’s Annual Cyber Report Counts 30,000 Incidents but Only 16 are 'Major'

March 14, 2017 FROM NEXTGOV arrow Federal agencies have made solid progress securing their sensitive data against malicious hackers and employee lapses, but there’s still a long road ahead, according to a recently released White House report. More than 30,000 data security incidents compromised federal information systems during the 2016 fiscal year, 16 of which were...

Trump Cyber Czar Brings Deep Expertise but Maybe Some Baggage, Too

March 13, 2017 FROM NEXTGOV arrow President Donald Trump’s pick to lead White House cybersecurity policy efforts brings a wealth of experience defending and exploiting computer networks, but he also brings three letters that could make him a tough sell to industry and privacy advocates: N-S-A. Trump plans to appoint Rob Joyce, chief of the National...

WikiLeaks Dump Shines Light on Government's Shadowy Zero-Day Policy

March 13, 2017 WikiLeaks’ massive release of CIA cyber exploits this week produced more questions than answers about the government’s shadowy procedure for hoarding damaging digital vulnerabilities that remain unknown even to a system's manufacturer. These bugs—called zero days because industry has had zero days to create and promulgate a software patch—can be...

WikiLeaks Dump Shines Light on Government's Shadowy Zero-Day Policy

March 10, 2017 FROM NEXTGOV arrow WikiLeaks’ massive release of CIA cyber exploits this week produced more questions than answers about the government’s shadowy procedure for hoarding damaging digital vulnerabilities that remain unknown even to a system's manufacturer. These bugs—called zero days because industry has had zero days to create and promulgate a software patch—can be...

Government Isn't Sharing Cyber Threats As Promised, Private Sector Says

March 9, 2017 FROM NEXTGOV arrow When it comes to cyber threat information sharing, it’s government that’s not holding up its end of the bargain, industry officials told lawmakers Thursday. Government classification frequently hinders cybersecurity companies’ ability to share information with clients and others in the private sector, effectively giving an adversary a broader playing ground,...

No Quick Fixes for Small Business Cybersecurity

March 8, 2017 FROM NEXTGOV arrow Small businesses are frequent targets for cyberattacks and their results can be devastating, but there’s no quick fix, advocates told lawmakers during a Wednesday hearing. There’s no uniform standard small businesses can adopt to ensure they won’t suffer a cyber breach, denial-of-service or ransomware attack or to ensure they won’t...

House Bill Aims for ‘Race to the Top’ in Election Security

March 7, 2017 FROM NEXTGOV arrow Legislation introduced Tuesday by two of the House’s top tech lawmakers would give states additional grant money to ensure their election systems are secured against hackers. Introduced by Reps. Jim Langevin, D-R.I., and Gerry Connolly, D-Va., the legislation would also provide grant money for states to upgrade to automatic voter...

Trump Team is Floating Cyber Executive Order to Industry

March 6, 2017 FROM NEXTGOV arrow Industry officials are reviewing a long-delayed Trump administration cybersecurity executive order, one official said Monday, a sign the order may be released soon. President Donald Trump was scheduled to sign the order more than a month ago, but abruptly canceled the signing without explanation. A revised draft of the order...

House Bill Would Give Companies Some Leeway to Hack Back

March 3, 2017 FROM NEXTGOV arrow House legislation floated Friday would give companies attacked by hackers free rein to penetrate those hackers' networks so long as they don’t destroy anything while they’re there. The Computer Fraud and Abuse Act currently bars companies and individuals from hacking into anyone else’s network even if that person is attacking...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download
  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care

    Download

When you download a report, your information may be shared with the underwriters of that document.