AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1601-1610 of 2710

From Nextgov: E-neighborhood watch program spreads to half of states

July 22, 2011 A law enforcement program designed to function like a nationwide e-neighborhood watch is now providing half of U.S. states with an information sharing capability that did not exist before 2001, according to a Homeland Security Department assessment of compliance with the 9/11 commission recommendations on the 10th anniversary of the...

Social networking patterns help snag bank fraud suspects

July 21, 2011 FROM NEXTGOV arrow The hardest part of untangling a web of organized cyber crime associated with the password-swiping Zeus virus is not the malicious code, but the thieves' scattered locations, FBI officials said Wednesday afternoon. The officials drew this conclusion from one successful attempt last fall to arrest about 92 people suspected of...

Administration seeks to fill gaps in privacy protections

July 21, 2011 FROM NEXTGOV arrow The Obama administration has proposed the first-ever privacy safeguards for protecting the personal information of citizens that is handled by federal computing systems. The National Institute of Standards and Technology specifications fill gaps in existing information security procedures that date back to 2003, such as the need to offer members...

Pentagon official worries about implications of British hacking scandal

July 20, 2011 FROM NEXTGOV arrow The British phone hacking scandal demonstrates the need for fortified consumer smartphones that block call interceptions, said the U.S. Joint Chiefs of Staff vice chairman, noting that the Pentagon pays a pretty pound for such technology today. While there is no evidence that reporters at the now-defunct News of the...

From Nextgov: Pentagon official worries about implications of British hacking scandal

July 20, 2011 The British phone hacking scandal demonstrates the need for fortified consumer smartphones that block call interceptions, said the U.S. Joint Chiefs of Staff vice chairman, noting that the Pentagon pays a pretty pound for such technology today. Read the whole story at Nextgov.com.

Government scolded for data breach notification delays

July 18, 2011 FROM NEXTGOV arrow The Obama administration in recent weeks has recommended that companies move more quickly to alert customers when their personal data is compromised. Now internal auditors are recommending the federal government listen to its own advice. In a report released Thursday, the Treasury Inspector General for Tax Administration dinged the IRS...

New FBI biometric database will help feds nab undocumented immigrants

July 18, 2011 FROM NEXTGOV arrow The federal government plans to use an upgraded FBI biometric database to identify dangerous undocumented immigrants for possible deportation more quickly and accurately, according to internal agency documents. The FBI is in the process of transitioning from its existing Integrated Automated Fingerprint Identification System to the Next -Generation Identification system...

Securing Critical Networks

July 18, 2011 FROM NEXTGOV arrow It seems every day we learn about a new intrusion into government or civilian networks. Likewise, the plans and proposals to thwart such threats are multiplying. The White House released two strategies earlier this year -- one civilian and one international -- that attempt to carve a path forward in...

From Nextgov: New FBI biometric database will help feds nab undocumented immigrants

July 18, 2011 The federal government plans to use an upgraded FBI biometric database to identify dangerous undocumented immigrants for possible deportation more quickly and accurately, according to internal agency documents. Read the full story on Nextgov.

DHS' failure to leverage large technology buys costs billions in lost savings

July 15, 2011 FROM NEXTGOV arrow The Homeland Security Department did not routinely attempt to slash costs for equipment through bulk purchasing, especially for billions of dollars' worth of explosive detection tools, according to the DHS inspector general. For instance, various Homeland Security agencies individually bought $170 million worth of small X-ray machines, metal detectors, and...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.