AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1641-1650 of 2710

ATF officials ignored red flags on website intended to help stop gun-trafficking

June 17, 2011 FROM NEXTGOV arrow Agents with the Bureau of Alcohol, Tobacco, Firearms and Explosives in Phoenix recorded abnormal sales of firearms in an electronic weapons-tracking system but no one intervened to stop the cross-border gunrunning, aides for Rep. Darrell Issa, R-Calif., chairman of the House Oversight and Government Reform Committee told Nextgov. Instead of...

Pentagon Concerned About Terrorists' Cyberwar Capabilities

June 16, 2011 FROM NEXTGOV arrow The Pentagon and foreign partners will follow the Cold War construct of "shared warning" to pursue enemies in cyberspace, Deputy Defense Secretary William J. Lynn III said on Thursday at the International Workshop on Global Security in Paris. Neither America nor its international partners have faced a true cyber attack...

Lawmakers finalize measure restricting government's use of GPS data

June 15, 2011 FROM NEXTGOV arrow A bipartisan group of House and Senate lawmakers on Wednesday finalized a bill that prohibits law enforcement officials from tracking the location of people's wireless devices without a warrant or parental consent, or unless an emergency is under way. The finished proposal represents a departure from an earlier version that...

On the Cyber Beat

June 15, 2011 Chief information security officers must balance mission requirements against threats to vital data. From the document leaking website WikiLeaks to the rise of smartphone computing, chief information security officers are confronting ever more threats to the data they are responsible for protecting. The number of attacks against federal networks increased...

Businesses urged to share more information on cyber threats

June 14, 2011 FROM NEXTGOV arrow The top counterterrorism official at the Homeland Security Department on Tuesday called on businesses to cooperate more with government when hit by hackers. "Let's face it -- cybersecurity primarily is a civilian space -- it is used mostly by businesses, but it is tied closely to national security," said Rand...

Hack of International Monetary Fund data raises global worries

June 13, 2011 FROM NEXTGOV arrow As world leaders grapple with the news that unidentified hackers have infiltrated the International Monetary Fund and obtained a large quantity of data -- the effects of which remain unknown -- some computer security and financial services experts speculated that such an attack on U.S. financial regulatory agencies would not...

From Nextgov: Hack of IMF data raises global worries

June 13, 2011 As world leaders grapple with the news that unidentified hackers have infiltrated the International Monetary Fund and obtained a large quantity of data -- the effects of which remain unknown -- some computer security and financial services experts speculated that such an attack on U.S. financial regulatory agencies would not...

Immigration Services Agency and FTC to Share Scam Tips Online

June 10, 2011 FROM NEXTGOV arrow The Federal Trade Commission is allowing the U.S. Citizenship and Immigration Services arm of the Homeland Security Department access to its secure consumer complaint database so USCIS officials can investigate scammers posing as immigration legal advisers, federal officials announced on Thursday. Typically only law enforcement officials can search through the...

ICE agents nab almost $15 million from software pirate's Swiss bank account

June 10, 2011 FROM NEXTGOV arrow U.S. Immigration and Customs Enforcement agents traced and seized about $15 million from sales of counterfeit antivirus software to a fugitive's Swiss bank account by relying on footwork and phone calls -- a nice break from cyber forensics, ICE investigators said on Friday. Witnesses tipped off ICE's Homeland Security Investigations...

FEMA watchdog endorses data mining to uncover overpayments

June 10, 2011 FROM NEXTGOV arrow Federal inspectors are calling for the Federal Emergency Management Agency to employ data mining software -- similar to that used by the board monitoring stimulus spending-- for preventing future losses, now that the agency is saddled with recovering about $643 million worth of potential overpayments for housing assistance. In a...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.