Flaws in the voter databases in Mayland and Washington state would allow hackers to effectively prevent people from voting, the New York Times reports.
Our new look highlights analysis and commentary on the latest technology, tools and tactics in public sector IT.
Wholesale migrations aren't expected soon, but IT managers say there are several ways the new OS could start slipping in through the side doors.
An innovative cryptographic scheme does away with trusted third parties to protect stored and scrambled passwords on separate servers.
Sandia Labs’ virtual Android network is part of a larger project to emulate large-scale networks to help understand and defend complex online environments.
Innovative security, a friendly (for real) cross-platform interface, and handy support for telework and BYOD could do a lot for public-sector organizations
Using NIST's Security Content Automation Protocol in tandem with TCG's Trusted Network Connect architecture provides the benefits of two open standards to improve endpoint security.
The government has specified a series of vetted cryptographic algorithms that can be used to verify the authenticity of documents and digital signatures. Here's how they do it.
The winner of the five-year competition -- called Keccak -- will be a candidate for the new federal SHA-3 standard, but NIST scientists say it is not a replacement for SHA-2, which has held up better than expected.
For agencies that need secure voice over IP communications, Belkin has introduced a switch that offers certralized control over audio ports.
A team from Indiana University frames PlaceRaider as a potential tool for burglars, but what if it got into government buildings?
Groovy, a subset of Java, is so easy to work with it, it could one day replace the ubiquitous programming language.