Top 10 datasets on data.gov

Of the nearly 1,300 datasets currently on Data.gov, you might be surprised which are the "most relevant."

The grace period on mobile security is over

As the bad guys turn their attention to mobile devices, the government has begun mapping out security that needs to be incorporated in coming generations of this technology.

With Apple deal, GPO a step closer to 'where we are going'

The Government Printing Office adds the Apple iBookstore to its growing list of outlets for electronic versions of federal books.

App breaks through the mobile compatibility wall

The Citrix Receiver app can keep agencies' mobile devices securely connected regardless of platforms.

Charge, sync, ship multiple iPads

If you're a government IT manager who needs to be sure everyone's iPads are ready and charged for the big meeting, consider this solution.

As BYOD gains fed acceptance, assume devices been hacked, protect the data

There's no one-size-fits-all solution, but it's just a matter of time before secure plans are in place, a CIO panel says.

Va mobile app opens up procurement opportunities

The for the state’s electronic procurement system (eVA) will make it easier to track business opportunities with government agencies in the state.

CBP puts $100M into sensors to track drug smugglers flying ultralights

The system, to be operated at border stations and in remote areas, is intended to thwart a growing threat.

USDA expects to manage 100,000 mobile devices

The department's planned Next Generation Mobility solution will manage mobile devices, applications and security.

Free app brings the database to iPhones, iPads

FileMaker Go 12 will display your database optimally for mobile devices, though only for those running iOS.

One way to manage BYOD: Limit the options

Intel's approach to managing personal devices, which includes evaluations under five general criteria, could be of interest to agencies of similar size.

10 agency IT projects take 2012 GCN Awards

The winning project teams found creative solutions to challenges in information sharing, end user services, military communications and other areas.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.