Smart App

Army app market to let customers have it their way

In the six-month pilot, users will be able to post requirements that developers can try to fill with existing or custom-made solutions.

US spectrum allocations

Why the new WiFi standard means fast times for wireless nets

It’s all about spectrum allocation, and devices with access to the 60 GHz band, 802.11ac devices would have enough to transmit uncompressed video, for example.

Sandia Labs’ virtual Android network is part of a larger project to emulate large-scale networks to help understand and defend complex online environments.

How to secure 300,000 smart phones? MegaDroid can help.

Sandia Labs’ virtual Android network is part of a larger project to emulate large-scale networks to help understand and defend complex online environments.

Windows 8

5 ways Windows 8 can be great for agencies

Innovative security, a friendly (for real) cross-platform interface, and handy support for telework and BYOD could do a lot for public-sector organizations

College campus

With eduroam, university users get secure WiFi access to the cloud

The wireless Internet service, widely used in Europe, is being expanded in the United States by Internet2, the University of Tennessee and the National Science Foundation.

Android malware builds 3D model of user's environment

A team from Indiana University frames PlaceRaider as a potential tool for burglars, but what if it got into government buildings?

802.11ac WiFi could help agencies cope with BYOD

The emerging WiFi standard could double the speed of your agency's wireless network ... once you have the equipment to take advantage of it.

From shipments to socks and ants, RFID is tagging everything

Modern RFID tags are only a few millimeters in size and comprise a chip, antenna and in some cases a battery (active). Some forms of RFID tags (passive) have no battery, but actually take power from the electromagnetic beams of a reader, and then send data back to the source. These tags can theoretically last forever, since they only send data or require power when actually being pinged by a reader device. Almost all RFID tags can be inserted into almost anything and do not require line of sight back to a reader. Some tags are so tiny that they have been glued to the backs of ants to track their behavior.

Army puts a 4G battlefield telemedicine system to the test

A real-time system that connects medics on the battlefield with surgeons at a hospital would save lives, if it can be made to work.

Can mobile devices work as ID cards, thin clients on a secure net?

DISA wants software that would let DOD personnel securely use smart phones and tablets on DOD networks.

Agencies yet to 'crack the code' on mobile management, security

Mobility is key for unlocking productivity, but government still struggles to securely manage mobile devices and their data, agency IT leaders say.

Air Force opts for Samsung Slate tablets

The device's portability, features and security could fit the service's requirements.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.