AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 911-920 of 1409

A Tech Evolutionary

May 1, 2012 One of the formative moments of federal Chief Information Officer Steven VanRoekel’s life was watching Star Wars in the movie theater as a child. That might not be surprising for a man who describes himself as “the tech geek” and who spent 15 years working his way up the Microsoft...

Tech Roundup

May 1, 2012 Chain Reaction Counterfeit materials increasingly endanger the military supply chain. Because technology often touches many hands in foreign countries before reaching a contractor, malicious actors have multiple opportunities to taint materials. In March, the Government Accountability Office announced its undercover investigators had ordered military-grade parts from online portals and received...

The Cloud is Vital for Sharing Census Data

April 30, 2012 FROM NEXTGOV arrow National Archives and Records Administration Chief Information Officer Michael Wash has run some numbers since NARA put the 1940 census online April 2. NARA outsourced hosting for the site to a cloud-based system managed by Archives.com. The genealogy site won a solicitation to host the platform on a no-cost contract,...

Communities crop up around Data.gov

April 30, 2012 FROM NEXTGOV arrow Officials at the government repository Data.gov launched a new community on Saturday that provides forums for developers to share experiences, ask questions and request data sets that aren’t yet available. Officials wanted Developers.Data.gov to be available in time for the Sunlight Foundation’s Transparency Camp Saturday and Sunday, an annual meeting...

The Introvert’s Dilemma in a Tech-Enabled World

April 27, 2012 FROM NEXTGOV arrow The Chronicle of Higher Education has an interesting take on the shifting divide between introverts and extroverts in modern society. Author William Pannapacker, who’s an English professor at Michigan’s Hope College, contends introversion is nearly pathologized by a contemporary culture that celebrates powerful, charismatic personalities to the exclusion of quiet...

Republicans boycott technology field hearing

April 27, 2012 FROM NEXTGOV arrow Republican members of the House Oversight and Government Reform Committee won’t participate in a proposed field hearing May 11 to get feedback from Northern Virginia technology firms that are major government contractors, the committee’s chairman said Thursday. Rep. Darrell Issa, R-Calif., sent a letter to the event’s Democratic hosts Thursday...

Salesforce.com launches suite of government cloud tools

April 25, 2012 FROM NEXTGOV arrow The cloud provider Salesforce.com is launching a federal version of its tools, which take a social networking approach to corporate functions such as sales, human resources management and training, according to Vivek Kundra, a company vice president and former federal chief information officer, who spoke Wednesday at a Salesforce event...

Sea of Japan Dispute Tops White House Petition Site

April 24, 2012 FROM NEXTGOV arrow Score one for the White House's petition site We the People when it comes to fostering public debate. A March 22 petition aimed at removing the name "Sea of Japan" from U.S. textbooks has shot to the number one spot on the petition site, gaining nearly 100,000 online signatures in...

GSA Tool Will Verify Fed Social Media Accounts

April 24, 2012 FROM NEXTGOV arrow The General Services Administration is reportedly working on a validation tool to help people verify whether a Tumblr account, Facebook page or Twitter handle that purports to be from a federal official or agency is legitimate. Sara Cope over at SocialFeds watched a preview of the tool called the Social...

Executive order targets Internet monitoring in Syria and Iran

April 23, 2012 FROM NEXTGOV arrow AP photo President Obama issued an executive order Monday authorizing sanctions against Syrian intelligence chief Ali Mamluk and other Syrian and Iranian officials and agencies for using the Internet, cellphones and other new technology to commit human rights abuses. The directive described Syrian and Iranian efforts to monitor, track, disrupt...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.