AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 811-820 of 1377

Spending oversight requires digging deep for data

July 6, 2012 FROM NEXTGOV arrow The most important step in using data analysis to reduce waste and fraud in government spending is to ensure you have all the information you need, an architect of the Recovery Accountability and Transparency Board’s system to track stimulus spending said Friday. That’s why the board insisted that primary recipients...

Will Western Tech Firms Stand for Freedom? Experts Are Split

July 6, 2012 FROM NEXTGOV arrow Internet experts are about evenly split on whether Western-based technology firms will protect dissidents in autocratic nations a decade down the road or whether they’ll be aiding the oppressors, according to a report released Thursday. By 2020, Western technology companies “will be expected to abide by a set of norms...

Treasury might change cloud hosts

July 5, 2012 FROM NEXTGOV arrow The Treasury Department is in the market for a long-term cloud-based host for its flagship Treasury.gov website and a handful of other sites, according to solicitation documents. The Treasury sites currently are hosted in Amazon’s EC2 cloud, which also houses numerous other federal sites, including several Energy Department sites and...

Agencies should publish lists of all their data, group says

July 3, 2012 FROM NEXTGOV arrow This story has been updated. Federal agencies should be required to maintain lists of their full data catalogs so agency officials and the public know what exists, what’s public and what’s not, Sunlight Foundation Policy Director John Wonderlich said Tuesday. That’s one line item in a list of best practices...

State Sticks with ‘Sea of Japan’ in Response to Online Petitions

July 3, 2012 FROM NEXTGOV arrow The State Department engaged in a little online diplomacy Friday when it responded to one of the most popular petitions to climb the White House’s We the People citizen petition site since its launch. The petition, signed by more than 100,000 people -- many of them South Koreans and Korean...

Don Draper Meets Big Data

July 2, 2012 FROM NEXTGOV arrow Among the best things about covering advances in big data analysis is you begin bumping into big data concepts in all sorts of unexpected places. Witness this recent episode of the Slate podcast "Lexicon Valley" on verbal anachronisms in the TV shows Mad Men and Downton Abbey. Host Mike Vuolo...

Tech Roundup

July 1, 2012 Network Defense The Obama administration is expanding to all military contractors a computer security program that shares classified threat information. After a year of trials with select vendors, the Defense Industrial Base, or DIB, cybersecurity pilot program will invite all military vendors and their Internet service providers to voluntarily join...

Experts split on the homes of the future

June 29, 2012 FROM NEXTGOV arrow About half of 1,021 technology leaders think the homes of 2020 will be fully Internet-enabled, with computer systems doing everything from writing out grocery lists to fixing leaky faucets, according to a report released Friday by the Pew Internet and American Life Project and Elon University’s Imagining the Internet Center...

Working the crowd: How USAID leveraged free labor to map a loan program’s effectiveness

June 29, 2012 FROM NEXTGOV arrow The crowd can be a great source of free labor, as long as you’ve done most of the hard work in advance and you’ve given those volunteers a good reason to participate, officials from the U.S. Agency for International Development’s Geocenter said Thursday. The Geocenter recently tapped 145 volunteers to...

What could Watson do with the budget?

June 28, 2012 FROM NEXTGOV arrow The Energy Department’s former science chief mused Wednesday about what IBM’s Jeopardy-winning Watson technology could do with the federal budget. Steven Koonin was leading a panel discussion at an IBM Capitol Hill briefing on big data analytics when he paused to half-seriously pitch the concept to IBM executives. “It would...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.