AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 861-870 of 1375

Think before you tweet

May 14, 2012 FROM NEXTGOV arrow Tweets may take just seconds to compose, but before they go out federal agencies should devote substantial time to figuring out who their audience is, their rules of engagement and who will be managing their Twitter accounts, a report released Monday urged. Social media strategies should address how deeply agencies...

A Single Federal Email System is Interesting, but Unlikely

May 14, 2012 FROM NEXTGOV arrow Friday marked the second time in as many weeks Federal Chief Information Officer Steven VanRoekel has publicly pondered a major Canadian initiative to pull the government’s entire information technology staff into a single agency and, perhaps most impressively, launch a single governmentwide email system. VanRoekel first mentioned the Shared Service...

Telework will play a big role in government digital strategy, federal CIO says

May 11, 2012 FROM NEXTGOV arrow The forthcoming digital government strategy will include telework as a major component, federal Chief Information Officer Steven VanRoekel told lawmakers and technology contractors Friday. The federal digital strategy, which VanRoekel said will be released soon, is a combination of two strategies the White House has been working on: one to...

BlackBerry Needs Apps to Retain Federal Market Share

May 10, 2012 FROM NEXTGOV arrow A compelling array of applications will be vital for Research in Motion’s forthcoming BlackBerry 10 if the company hopes to maintain some share of the federal marketplace it once dominated, a government vendor said Wednesday. That won’t be an easy sell for developers, however, who don’t see RIM’s BlackBerry as...

Social Security’s IT modernization lacks a strategic plan

May 10, 2012 FROM NEXTGOV arrow The Social Security Administration has invested more than $5 billion in information technology modernization over the past decade without effectively measuring how each reform would improve its services, a watchdog testified before members of a House subcommittee on Wednesday. As a result, the agency does not have reliable data on...

New App Will Help the Disabled Report Income

May 9, 2012 FROM NEXTGOV arrow The Social Security Administration is developing a mobile application for people who receive Supplemental Security income from the agency, Chief Information Officer Kelly Croft told a House subcommittee Wednesday. SSI benefits, which are intended to help aged, blind or disabled people pay for food and other basic needs, must be...

GAO rejects protest of $70 million IT contract at CDC

May 8, 2012 FROM NEXTGOV arrow The Comptroller General’s Office rejected arguments from Unisys Corp. on Monday that the Centers for Disease Control and Prevention tricked it into overbidding on a $70 million contract to combine the agency’s legacy information technology systems. Unisys argued CDC officials misled the company into raising its proposed price tag from...

Two-thirds of embassies are Tweeting

May 8, 2012 FROM NEXTGOV arrow About 70 percent of U.S. embassies are active on Twitter, many of them Tweeting in the local language as well as English , according to a report released Tuesday by the Sunlight Foundation, a government transparency advocacy group. Most of the 121 U.S. embassies on Twitter use the social media...

The many mothers of invention

May 8, 2012 FROM NEXTGOV arrow Innovations such as a 2006 Transportation Department pilot program to reduce traffic jams and exhaust pollution can be spawned by a sudden influx of funding, panelists at Government Executive Media Group’s Excellence in Government conference said Monday. Or they can be prompted by the dearth of funding agencies face today....

Gathering data is just the first step

May 7, 2012 FROM NEXTGOV arrow The explosion of big data across government and industry is just the first step in developing more efficient, data-driven services, Corporate Executive Board managing director Sampriti Ganguli said Monday. The next steps are figuring out what the data means, separating the wheat from the chaff and, finally, turning that knowledge...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.