AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 801-810 of 1377

Goodbye Red Phone, Hello Blue Bird

July 16, 2012 FROM NEXTGOV arrow The Russian Foreign Ministry plans to launch a Facebook page soon and is offering “special courses to teach diplomats how to make the most of their Twitter accounts to help promote Russia’s position on the world stage,” the state-owned Ria Novosti news service reported Monday. The ministry also launched a...

Do we need a governmentwide wiki?

July 13, 2012 FROM NEXTGOV arrow Government wikis such as the State Department’s Diplopedia and the intelligence community’s Intellipedia aim to be go-to resources for federal employees to get information about internal or external matters, such as how to organize a particular report or where colleagues in a reorganized bureau landed. One of the greatest benefits...

Half of agency websites are using an updated Internet address system

July 13, 2012 FROM NEXTGOV arrow Federal agencies had transitioned an estimated 50 percent of their public facing websites and online services to Internet protocol version 6 as of June and are on track to have all of them moved by September, officials said Friday. The latest protocol also should be fully integrated into agencies’ security,...

There’s Nothing Sexy About Wikipedia

July 13, 2012 FROM NEXTGOV arrow In addition to being the center of most everything else these days, the Internet is a hub of capitalism. With new things being monetized everywhere you look online, federal agencies, universities and nonprofits face a dilemma: how to look user friendly, hip and authoritative, all while making it clear you’re...

A Campaign Tweet With History

July 12, 2012 FROM NEXTGOV arrow That former federal Chief Technology Officer Aneesh Chopra would announce his candidacy to be Virginia’s lieutenant governor on Twitter may have been a given in retrospect. What better way for a technologist to simultaneously reach out to his natural constituency and build new followers. One major question remains, though, about...

Slowdown in Private Sector Tech Could Be a Warning to Government

July 12, 2012 FROM NEXTGOV arrow Reuters reported Wednesday that even the normally bullish tech sector is bracing for lower-than-expected quarterly earnings reports, causing investors to back off the likes of Microsoft, IBM and Intel. Here’s the explainer: Corporate IT budgets have historically proved more resilient to worsening macroeconomic conditions than other kinds of spending, because...

Agencies aren’t providing enough details about future cloud moves, GAO says

July 11, 2012 FROM NEXTGOV arrow Nineteen of 20 agency plans for future cloud computing projects are missing important elements, a watchdog said Wednesday. For example, seven of the 20 blueprints submitted to the Office of Management and Budget do not include any cost estimates, according to the Government Accountability Office report. None of the 14...

Agencies’ initial IT reviews reveal major savings potential, federal CIO says

July 11, 2012 FROM NEXTGOV arrow This story has been updated. Investment review board meetings aimed at rooting out waste and duplication in government information technology portfolios have turned up $500 million in potential savings at just the six agencies reviewed so far, the federal chief information officer said Wednesday. Federal CIO Steven VanRoekel plans to...

DATA Act might have saved GSA from scandal

July 10, 2012 Information collected under the Digital Accountability and Transparency Act, now pending before Congress, could have helped prevent the over-the-top 2010 conference that erupted into a General Services Administration scandal in April, data vendors said Tuesday. It also might have spotted warning signals that the $500 million Energy Department loan guarantee...

What Comes First: the Data or the Civic Hackers?

July 9, 2012 FROM NEXTGOV arrow An interesting debate simmering over at the Global Integrity blog points to the complicated nexus between open data and development. The exchange was sparked by a Guardian op-ed by Walid Al-Saqaf, a Yemeni journalist and open government advocate, in which he called on the Yemeni government to establish a digital...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.