AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 11-20 of 1377

The NSA-Cyber Command Divorce Is Inching Closer to Reality

December 1, 2016 The final draft of an annual defense policy bill, released Wednesday, elevates U.S. Cyber Command to a full combatant command and sets strict conditions before it can be split from its sister intelligence agency, the National Security Agency. CYBERCOM has been run in a “dual hat” system by the NSA...

White House Plans to Retire Outdated Cyber Regulations

December 1, 2016 FROM NEXTGOV arrow White House cyber officials have identified 63 different policy directives, regulations or other requirements they plan to retire, the government’s chief information security officer said Wednesday. Some of the directives slated for retirement date back to the 1990s, CISO Gregory Touhill told an audience at the FireEye Cyber Defense Summit....

House Homeland Chairman Braces for Jurisdiction Fight Next Congress

November 30, 2016 FROM NEXTGOV arrow House Homeland Security Chairman Michael McCaul, R-Texas, wants to wrest oversight of the Homeland Security Department from competing committees next Congress, he said Wednesday. The current jurisdictional system, which divvies up DHS oversight between numerous committees, is simply too complex to get needed reforms passed, McCaul said at the Bipartisan...

Compromise Defense Policy Bill Elevates Cyber Command

November 30, 2016 FROM NEXTGOV arrow The final draft of an annual defense policy bill, released Wednesday, elevates U.S. Cyber Command to a full combatant command and sets strict conditions before it can be split from its sister intelligence agency, the National Security Agency. CYBERCOM has been run in a “dual hat” system by the NSA...

Trump Appoints Legislative Cyber Leaders to Transition Team

November 30, 2016 FROM NEXTGOV arrow President-elect Donald Trump today named a trio of congressional cyber leaders to his transition team, including House Intelligence Chairman Devin Nunes, R-Calif. The appointments could give some indication of a serious cyber focus for the incoming Trump administration, whose cyber positions have been largely opaque. Trump pledged in a video...

Updated Intel Bill Mandates FBI Report on Cyber Recruiting

November 29, 2016 FROM NEXTGOV arrow An updated draft of a must-pass intelligence policy bill released Tuesday includes a mandate for the FBI to report on efforts to integrate cyber expertise into its investigations. The report, due to congressional intelligence committees in six months, should include clear benchmarks about efforts to recruit and retain agents with...

Fight Over FBI Hacking Powers Comes Down to the Wire

November 28, 2016 FROM NEXTGOV arrow A top Justice Department official pushed back Monday against critics of an FBI hacking powers expansion set to take effect Thursday, saying the critics are confusing substantive issues with procedural ones. The debate centers on an amendment to Rule 41 of the Federal Rules of Criminal Procedure, which would allow...

Election Security Expert Urges Paper Trail Audit

November 23, 2016 FROM NEXTGOV arrow President-elect Donald Trump’s upset victory over Hillary Clinton was “probably not” orchestrated by foreign hackers, a top election security expert said this morning. But state election officials should audit the election’s paper and digital trails regardless, said J. Alex Halderman, a professor of electrical engineer and computer science and director...

Under Trump, Tech Companies Brace for Fight Over Encryption

November 23, 2016 As Donald Trump fills out national security and law enforcement posts in his new cabinet, the future of encryption may hang in the balance. On the campaign trail, the president-elect was a committed foe of cop-proof encryption systems that shield customer communications even from the communications provider. Most prominently, he...

Trump Promises to Ask the Pentagon for a Plan to Defend the Country from Cyber Attacks

November 23, 2016 President-elect Donald Trump will ask the Defense Department and the chairman of the Joint Chiefs of Staff “to develop a comprehensive plan to protect America’s vital infrastructure from cyberattacks and all other form of attacks,” according to a video posted Monday. Trump included the plan in a list of “executive...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.