AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 81-90 of 1550

WikiLeaks Dump Shines Light on Government's Shadowy Zero-Day Policy

March 13, 2017 WikiLeaks’ massive release of CIA cyber exploits this week produced more questions than answers about the government’s shadowy procedure for hoarding damaging digital vulnerabilities that remain unknown even to a system's manufacturer. These bugs—called zero days because industry has had zero days to create and promulgate a software patch—can be...

WikiLeaks Dump Shines Light on Government's Shadowy Zero-Day Policy

March 10, 2017 FROM NEXTGOV arrow WikiLeaks’ massive release of CIA cyber exploits this week produced more questions than answers about the government’s shadowy procedure for hoarding damaging digital vulnerabilities that remain unknown even to a system's manufacturer. These bugs—called zero days because industry has had zero days to create and promulgate a software patch—can be...

Government Isn't Sharing Cyber Threats As Promised, Private Sector Says

March 9, 2017 FROM NEXTGOV arrow When it comes to cyber threat information sharing, it’s government that’s not holding up its end of the bargain, industry officials told lawmakers Thursday. Government classification frequently hinders cybersecurity companies’ ability to share information with clients and others in the private sector, effectively giving an adversary a broader playing ground,...

No Quick Fixes for Small Business Cybersecurity

March 8, 2017 FROM NEXTGOV arrow Small businesses are frequent targets for cyberattacks and their results can be devastating, but there’s no quick fix, advocates told lawmakers during a Wednesday hearing. There’s no uniform standard small businesses can adopt to ensure they won’t suffer a cyber breach, denial-of-service or ransomware attack or to ensure they won’t...

House Bill Aims for ‘Race to the Top’ in Election Security

March 7, 2017 FROM NEXTGOV arrow Legislation introduced Tuesday by two of the House’s top tech lawmakers would give states additional grant money to ensure their election systems are secured against hackers. Introduced by Reps. Jim Langevin, D-R.I., and Gerry Connolly, D-Va., the legislation would also provide grant money for states to upgrade to automatic voter...

Trump Team is Floating Cyber Executive Order to Industry

March 6, 2017 FROM NEXTGOV arrow Industry officials are reviewing a long-delayed Trump administration cybersecurity executive order, one official said Monday, a sign the order may be released soon. President Donald Trump was scheduled to sign the order more than a month ago, but abruptly canceled the signing without explanation. A revised draft of the order...

House Bill Would Give Companies Some Leeway to Hack Back

March 3, 2017 FROM NEXTGOV arrow House legislation floated Friday would give companies attacked by hackers free rein to penetrate those hackers' networks so long as they don’t destroy anything while they’re there. The Computer Fraud and Abuse Act currently bars companies and individuals from hacking into anyone else’s network even if that person is attacking...

New Bill Would Expand DHS Cyber Aid to State and Local Governments

March 3, 2017 Two U.S. senators introduced legislation Thursday that would increase the Homeland Security Department’s responsibility for helping state and local governments to combat and protect against cyberattacks. The bill, sponsored by Sens. Gary Peters, D-Mich., and David Perdue, R-Ga., would require DHS’ main cyber operations agency to help state and local...

Shoddy U.S. Cyber Deterrence Policy Emboldens Adversaries, Lawmakers Say

March 2, 2017 FROM NEXTGOV arrow The U.S. has powerful weapons with which to respond to enemy cyberattacks, but the effectiveness of those weapons is vastly diminished by a cyber deterrence policy disjointed at best and nonexistent at worst, senators and former defense officials said Thursday. The nation's possible cyber responses range from retaliatory strikes with...

New Bill Would Expand DHS Cyber Aid to State and Local Governments

March 2, 2017 FROM NEXTGOV arrow Two senators introduced legislation Thursday that would increase the Homeland Security Department’s responsibility for helping state and local governments to combat and protect against cyberattacks. The bill, sponsored by Sens. Gary Peters, D-Mich., and David Perdue, R-Ga., would require DHS’ main cyber operations agency to help state and local officials...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download
  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care

    Download

When you download a report, your information may be shared with the underwriters of that document.