AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 851-860 of 1420

Agencies’ initial IT reviews reveal major savings potential, federal CIO says

July 11, 2012 FROM NEXTGOV arrow This story has been updated. Investment review board meetings aimed at rooting out waste and duplication in government information technology portfolios have turned up $500 million in potential savings at just the six agencies reviewed so far, the federal chief information officer said Wednesday. Federal CIO Steven VanRoekel plans to...

DATA Act might have saved GSA from scandal

July 10, 2012 Information collected under the Digital Accountability and Transparency Act, now pending before Congress, could have helped prevent the over-the-top 2010 conference that erupted into a General Services Administration scandal in April, data vendors said Tuesday. It also might have spotted warning signals that the $500 million Energy Department loan guarantee...

What Comes First: the Data or the Civic Hackers?

July 9, 2012 FROM NEXTGOV arrow An interesting debate simmering over at the Global Integrity blog points to the complicated nexus between open data and development. The exchange was sparked by a Guardian op-ed by Walid Al-Saqaf, a Yemeni journalist and open government advocate, in which he called on the Yemeni government to establish a digital...

Spending oversight requires digging deep for data

July 6, 2012 FROM NEXTGOV arrow The most important step in using data analysis to reduce waste and fraud in government spending is to ensure you have all the information you need, an architect of the Recovery Accountability and Transparency Board’s system to track stimulus spending said Friday. That’s why the board insisted that primary recipients...

Will Western Tech Firms Stand for Freedom? Experts Are Split

July 6, 2012 FROM NEXTGOV arrow Internet experts are about evenly split on whether Western-based technology firms will protect dissidents in autocratic nations a decade down the road or whether they’ll be aiding the oppressors, according to a report released Thursday. By 2020, Western technology companies “will be expected to abide by a set of norms...

Treasury might change cloud hosts

July 5, 2012 FROM NEXTGOV arrow The Treasury Department is in the market for a long-term cloud-based host for its flagship Treasury.gov website and a handful of other sites, according to solicitation documents. The Treasury sites currently are hosted in Amazon’s EC2 cloud, which also houses numerous other federal sites, including several Energy Department sites and...

Agencies should publish lists of all their data, group says

July 3, 2012 FROM NEXTGOV arrow This story has been updated. Federal agencies should be required to maintain lists of their full data catalogs so agency officials and the public know what exists, what’s public and what’s not, Sunlight Foundation Policy Director John Wonderlich said Tuesday. That’s one line item in a list of best practices...

State Sticks with ‘Sea of Japan’ in Response to Online Petitions

July 3, 2012 FROM NEXTGOV arrow The State Department engaged in a little online diplomacy Friday when it responded to one of the most popular petitions to climb the White House’s We the People citizen petition site since its launch. The petition, signed by more than 100,000 people -- many of them South Koreans and Korean...

Don Draper Meets Big Data

July 2, 2012 FROM NEXTGOV arrow Among the best things about covering advances in big data analysis is you begin bumping into big data concepts in all sorts of unexpected places. Witness this recent episode of the Slate podcast "Lexicon Valley" on verbal anachronisms in the TV shows Mad Men and Downton Abbey. Host Mike Vuolo...

Tech Roundup

July 1, 2012 Network Defense The Obama administration is expanding to all military contractors a computer security program that shares classified threat information. After a year of trials with select vendors, the Defense Industrial Base, or DIB, cybersecurity pilot program will invite all military vendors and their Internet service providers to voluntarily join...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.