Will Windows 8 work in the government enterprise?

What are agencies looking for in the forthcoming OS, which is designed for both tablets and desktops/laptops? You tell us.

Beware the price of free campaign apps

Some political campaign apps are a lot like politicians; they seem to be more interested in what they can collect than what they deliver.

Mobilescope warns you when apps are leaking data

Mobile apps often take liberties with your personal data; this tool lets you know what they're up to.

DHS wants to 'change the game' on public safety network

Faced with a need to upgrade aging, stovepiped tactical communications networks and reduce costs, DHS is looking for a “game changing approach.”

Great mobile app: Census data you can actually use

The America's Economy app goes beyond being a window into a database, it provides a stream of important, regularly updated reports accompanied by graphs.

VA, DOD joint office delivers mobile app for PTSD patients

PE Coach app gives PTSD sufferers a central site to track their therapy sessions and more.

Will AT&T's phase-out of 2G service affect gov customers?

The company, a service provider under the GSA’s Networx telecom contract, will phase out 2G mobile service during the next five years to make room on its networks for more advanced services.

NCI gets agile in developing mobile website

IT leaders decided against responsive design, at least for now, but embraced agile development.

Mobile debate: Adapt website or build your own app?

Each method has its advantages so the National Cancer Institute started by looking at apps already on the market.

Md. governor's office trades paper, printers for iPads

One-man iPad pilot program now embraces 30 staffers and has reduced office paper use by 90 percent to 95 percent.

How one agency followed its users onto the mobile Web

The National Cancer Institute's website wasn't mobile friendly, but that didn't stop visits via mobile devices from increasing fivefold in six months.

NC police get smart-phone access to crime database

Officers on the street can access the Criminal Justice Law Enforcement Automated Data Services database from their smart phones and tablets in seconds.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.