AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 11-20 of 1575

Lawmakers to Pentagon: Tell Us When You Use Cyber Weapons

June 8, 2017 Defense Department officials would be required to notify congressional overseers within 48 hours of launching any sensitive cyber operation under legislation introduced Thursday by top lawmakers on the House Armed Services Committee. The law would apply to both offensive and defensive cyber operations that leave DOD networks and produce effects...

Lawmakers Want Notice when Pentagon Uses Cyber Weapons

June 8, 2017 FROM NEXTGOV arrow Defense Department officials would be required to notify congressional overseers within 48 hours of launching any sensitive cyber operation under legislation introduced Thursday by top lawmakers on the House Armed Services Committee. The law would apply to both offensive and defensive cyber operations that leave DOD networks and produce effects...

Kelly Defends Cuts to Science and Tech Budget

June 7, 2017 FROM NEXTGOV arrow The Homeland Security Department plans to make up for a roughly 20 percent proposed funding cut at its Science and Technology Directorate by relying on research and development from other government labs and the private sector, Secretary John Kelly told lawmakers Wednesday. The department’s science and technology wing funds the...

DHS May Fast-Track Bug Bounties But Hit Brakes on Election Security

June 6, 2017 FROM NEXTGOV arrow The Homeland Security Department may not wait for a legislative push before starting a bug bounty program, Secretary John Kelly told lawmakers Tuesday. Bug bounties are cash rewards organizations offer to ethical hackers who spot exploitable flaws in their systems. They’re common at major tech companies and have been done...

Task Force Urges a Cyber Coordinator for Health Care

June 5, 2017 FROM NEXTGOV arrow The Health and Human Services Department should have a single point person to coordinate cybersecurity initiatives with the health care industry, according to a recent report. That cyber coordinator should be responsible for working with industry to assess cybersecurity risks and ensuring government efforts to improve health care cybersecurity aren’t...

How Should the U.S. Build a Cyber Workforce of the Future?

June 5, 2017 FROM NEXTGOV arrow The education division of the government’s cybersecurity standards agency is days away from releasing a request for public input about how best to train the next generation of cybersecurity professionals, an official said Monday. The information request follows an executive order President Donald Trump released in May that required a...

Health Data Security Tops HHS' List of Challenges

June 2, 2017 FROM NEXTGOV arrow Enhancing the cybersecurity of the Health and Human Service Department will be a top challenge in the coming year, according to a report to Congress released this week. The amount and complexity of HHS data makes it difficult for the department to adequately protect that data from hackers and from...

Banking Insurance Agency is Weak on Cybersecurity

June 1, 2017 FROM NEXTGOV arrow The government agency that insures banks against devastating losses isn’t doing enough to secure its sensitive financial information from cyber intruders, a government watchdog said Wednesday. The Federal Deposit Insurance Corporation has made strides to protect its information, according to the Government Accountability Office report, but those protections remain “significant[ly]...

NIST Wants to Protect Internet Traffic from Hijacking and Spying

May 31, 2017 FROM NEXTGOV arrow The government’s cybersecurity standards agency is seeking public feedback on a slate of recommendations for better ensuring the security of internet traffic routing. The planned “cybersecurity practice guide” will detail best practices for protecting internet traffic from various cyberattacks that rely on rerouting web traffic to points where it can...

Here’s How Agencies Should Implement Trump’s Cyber Order

May 31, 2017 FROM NEXTGOV arrow Agency directors can designate a subordinate to be accountable for ensuring the cybersecurity of agency networks rather than taking full responsibility themselves, according to recent White House guidance. The guidance follows a mid-May executive order from President Donald Trump that declared agency heads “will be held accountable by the President...