Get ready for wearables

Get ready for wearables

Though we may be years away from significant adoption, it’s important for government agencies to begin incorporating wearables into their security planning now.

How hard is it to permanently delete data?

How hard is it to permanently delete data?

Even though Hillary Clinton deleted her email, experts can probably recover it.

Air gap vulnerabilities

Researchers show air-gapped systems susceptible to attack

Air-gapped systems, thought to be the most secure because of their isolation, have newly discovered vulnerabilities.

Internet voting not secure enough

Online voting still faces security issues

Suggestions for tech-based solutions for voting and elections may sound practical, but they are certain security hazards.

FirstNet needs cyber safeguards

Public-safety answering points and other 911 service providers need cybersecurity professionals and continuity plans in case of cyber disasters.

How agencies can tighten personnel security

How agencies can tighten personnel security

With integrated electronic systems, agencies can better control their personnel security.

How the Identity of Things will streamline the citizen experience

How the Identity of Things will streamline the citizen experience

The Identity of Things creates a single, consistent, panoramic view of a citizen across every department in an organization, reducing the time to roll out new services from years to weeks.

Tech giants dabble in digital currency

Tech giants, Federal Reserve eye digital currency

According to recent reports IBM and Intel – and possibly the Federal Reserve – are considering using the blockchain technology associated with bitcoin to create a new digital payments system.

IARPA preps insider threat monitoring projects

IARPA preps insider threat monitoring projects

The intelligence community will brief firms on its plans for new insider threat detection and monitoring systems.

Next BlackBerry tablet is aimed at government

Next BlackBerry tablet is aimed at government

BlackBerry announced the SecuTablet, a new secure tablet outfitted with technology components from Samsung, IBM and Secusmart, a German encryption company acquired by BlackBerry last year.

Secure drone software inhibits hackers

Secure drone software evades hackers

Tech company Galois has developed a secure software solution that makes drones invulnerable to buffer overflow attacks, network sniffing, replay attacks and authentication attacks.

3 ways to combat threats from ‘device creep’

3 ways to combat threats from ‘device creep’

Government network managers do not need removable storage tools; secure managed file transfer systems can get the job done with less risk.