AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 641-650 of 1375

Government has Shuttered 64 Data Centers Since August

November 16, 2012 The government has shuttered 382 data centers since 2010, 64 of them in the past three months, according to updated figures the Office of Management and Budget released Thursday. Agencies plan to close 315 more centers by the end of September 2013, according to a spreadsheet posted to the government...

#Sandy’s lessons for government social media

November 16, 2012 FROM NEXTGOV arrow Genevieve Contey and David Miller gave a presentation Wednesday about their experience managing the National Oceanic and Atmospheric Association’s social media platforms during Hurricane Sandy. The presentation included a number of lessons learned. Chief among them: Be as clear as possible during an emergency using “dates, time zones, and only...

Government has shuttered 64 data centers since August

November 16, 2012 FROM NEXTGOV arrow The government has shuttered 382 data centers since 2010, 64 of them in the past three months, according to updated figures the Office of Management and Budget released Thursday. Agencies plan to close 315 more centers by the end of September 2013, according to a spreadsheet posted to the government...

IT projects may not be getting enough oversight

November 16, 2012 FROM NEXTGOV arrow The White House should do a better job of tracking whether agencies’ major technology projects are at risk of going off the rails and agencies should perform more oversight on their operations and maintenance spending, according to two recent watchdog reports. The first report, released publicly by the Government Accountability...

Secessionists and big government

November 15, 2012 FROM NEXTGOV arrow One interesting side note about the string of secession petitions posted to the White House’s We the People site in recent days is that the petitioners don’t seem interested in merely dividing red states from blue states. No, if you take the petitioners at their word -- and the majority...

Lawmaker: Let travelers choose between speed and privacy at airport checkpoints

November 15, 2012 FROM NEXTGOV arrow During a House hearing Thursday regarding malfunctioning privacy controls on 91 full-body airport scanners that are being held in storage, Rep. Mike Rogers, R-Ala., asked a novel question. Why doesn’t the Transportation Security Administration place the malfunctioning scanners in airports and let travelers decide whether privacy or passing through the...

Residents of all 50 states have filed secession petitions

November 15, 2012 FROM NEXTGOV arrow Vermont became the 50th state in which some residents are seeking permission to secede from the union Thursday using the White House’s petition site We the People. The Vermont petition became visible on the site sometime after 10 a.m. It wasn’t actually authored by a Green Mountain State resident but...

The best of the non-secession petitions to the White House

November 14, 2012 FROM NEXTGOV arrow Update: The petition has been removed for violating We the People's terms of participation The rush of new secession-inspired We the People petitions following President Obama’s reelection has included some old saws, some absolute arcana and a fair amount of vitriol on both sides. I think this one takes the...

Expect IT consolidation, cost cutting during Obama’s second term

November 14, 2012 FROM NEXTGOV arrow Expanding the Office of Management and Budget’s PortfolioStat process for reviewing agencies’ informational technology spending will be one focus of the second Obama term, Deputy Federal Chief Information Officer Lisa Schlosser said Wednesday. Federal CIO Steven VanRoekel launched PortfolioStat in March focused mainly on reducing what agencies were paying for...

Citizens in nearly every state petition White House for right to secede

November 14, 2012 FROM NEXTGOV arrow This story was last updated at 3:30 p.m. to reflect that petitions for Maryland and Connecticut to secede appeared on the public site. For the most recent story and to find out which state was the last holdout, click here. The number of states where a handful of citizens were...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.