Tablet, smartphone, ebook reader and laptop sitting on a blueprint

OMB delivers advice to help agencies get going on mobile

The Mobile Security Reference Architecture is one more guide for agencies wrestling with how so securely bring smart phones and tablets into their networks.

GammaTech Durabook TA10

Rugged tablet has the toughness, security features for field duty

GammaTech's Durabook TA10 meets a variety of MIL-STD and IP standards and can include a FIPS 201 fingerprint scanner for two-factor authentication.

social network illustration

Telework challenge: Employees who resist telework tools

USDA is using technologies such as teleconferencing and social media for collaboration, but challenges include some employee resistance and incompatible software.

Look back at 30 years of government IT

The best (and worst) influences on 30 years of government IT

From the IBM PC to apps on demand, and cyber threats to FISMA, our experts weigh in on the biggest influences — good and bad — of the past three decades.

Epson PowerLite 4000 series installation projectors with iProjection app

Projectors light up large venues, with iOS, Android control

Epson's new PowerLight 4000 series produce enough lumens for just about any room and have an app that gives users full control from iOS and Android devices.

Samsung Galaxy and Apple iPhone

A breakdown of DOD security controls for iOS and Android

DISA specifies required capabilities for secure use of two more mobile operating systems on DOD networks.

30-year showdown: IBM PC vs. Apple iPhone

While marking GCN's 30th year, we're taking a look at how far computing has progressed in three decades. It's no secret that PCs have advanced greatly in the intervening years, but how does an IBM PC stack up against an iPhone?

iPhone in hands of Army user

DISA opens a path for iOS, Android devices in military

The agency approves security guidelines for Android and iOS operating systems, expanding the range of new devices in a market dominated by BlackBerry.

T 10 mobile application

'Largest hackathon ever' gives NASA a new payload of space apps

More than 9,000 people representing 44 countries took part in the agency's challenge, producing 770 entries and five overall winners.

Citrix Receiver with BAI CAC reader

Citrix Receiver now supports Android smart-card authentication

The software supports CAC and PIV card authentication, and meets NSA and DISA requirements for secure Bluetooth communication.

Citizen reports landslide to city via 311 app

Salesforce.com optimizes mobile apps for government

Four new cloud-based mobile solutions let agencies collaborate, connect with citizens from any device and speed up mobile app development.

Biometric Associates smart card reader

Mobile authentication for CAC, PIV cards could get easier

A new app works with the cards on iOS and Android platforms, as will future versions of BlackBerry 10.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.