White House releases code to updated mobile app

Source code for iOS and Android developers is available on GitHub.

Magic log-in ring lets you use finger swipes for passwords

Researchers at Rutgers have developed a prototype device that lets you authenticate with the swipe of a finger.

Navigating the 'unholy' matrimony of mobile and cloud

Mobile computing and the cloud, which each have their own security concerns, have become inseparable.

What OS X Mountain Lion can do for the enterprise

As more agencies adopt Apple's mobile devices, the new OS' security, messaging and synch-ability could make the workplace more efficient and enjoyable.

Chip encrypts Android calls, without the lag time

TrustCall system can turn almost any Android phone into a secure communication device.

Labor Day salute: Three apps for workers

The Labor Department offers three mobile apps that workers may want to consider when the Labor Day holiday ends.

VA for Vets' automated, mobile system helps veterans find jobs

A cloud-based case management system with mobile components helps veterans get back into the workforce.

GOP platform: Sell off government spectrum

The pro-business platform calls for auctioning off surplus RF spectrum and condemns government regulation of the Internet — except when it should be regulated.

The death of the PC: real or exaggerated?

PC sales have slowed and mobile mania continues to grow, which might make you think government PCs are heading the way of the typewriter. But maybe not.

NASA's next satellite: An everyday Android smart phone

The PhoneSat marks the beginning of what the agency says is a new model for quickly developing and deploying satellites.

Top 10 datasets on data.gov

Of the nearly 1,300 datasets currently on Data.gov, you might be surprised which are the "most relevant."

The grace period on mobile security is over

As the bad guys turn their attention to mobile devices, the government has begun mapping out security that needs to be incorporated in coming generations of this technology.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.