The details of a national public safety network have yet to be worked out, but the consensus is it will be based on the emerging Long Term Evolution standard.
Police on the street and in the crowd used iPhones for encrypted voice, data and video, free of the congestion that can hamper a commercial wireless network.
HID Global has a service that would let users replace ID credentials and tokens with their BlackBerry phones. Could it work in a government enterprise?
The codes are a known tool for delivering malware, but a recent experiment showed that security pros will risk a scan for an iPad.
ThinkPad X1 Ultrabook combines speed, performance and security with a rugged design.
Old servers, drives and other media can be dangerous sources of data leakage; NIST has guidelines for removing data before the hardware goes out the door.
The incentive to developers could help restore interest in government circles.
People are starting to get suspicious about what apps take from them, and are declining to download, a Pew study shows.
VMware Horizon Suite will offer secure, flexible management of a mobile workforce that needs increasingly needs anytime, anywhere access from any device.
Overclocked chips, dual graphics processors make the EON17-SLX notebook a real powerhouse.
Source code for iOS and Android developers is available on GitHub.
Researchers at Rutgers have developed a prototype device that lets you authenticate with the swipe of a finger.