security

Security tool keeps data safe across collaboration systems

CipherPoint data security software prevents privileged IT administrators, attackers from accessing sensitive information across on-premise and cloud-based collaboration systems.

Kyocera glass

Revolutionary way to transmit sound is being heard

Kyocera’s proprietary Smart Sonic technology transmits sounds via the air and through body tissue -- mitigating background noise and traveling through ear plugs.

cloud money

Cloud gaining traction as state and local cost-cutter

Nearly half of the government IT professionals in a survey said their state or municipality has migrated or plans to move applications to the cloud, according to a Unisys study.

police crowd

California PD tests the limits of cellphone tracking

Mountain View police recently tested an opt-in system from Polaris and found that it mostly works, though there are trade-offs.

Managers concerned about IT budgets, cybersecurity

IT managers: The biggest threat to infrastructure isn't cyber

Reducing costs, improving security, boosting efficiency are the top priorities for federal, state and local agencies, according to a Cisco survey.

Young girls fishing in a small creek

EPA's How's My Waterway app delivers transparency, environmental awareness

EPA's How's My Waterway web application was designed to conserve technology, operate across multiple devices and maintain a bond of information transparency to the public.

VALET

Visual analytics app gives police a nearly omniscient view

Purdue University researchers' VALET combines crime, traffic, geospatial, weather and other data on one screen for real-time situational awareness and predictive capabilities.

USS San Antonio

Navy's 4G LTE network signals new era in ship-to-ship communications

The Long-Term Evolution network lets personnel on the two ships receive real-time video streaming from air nodes mounted on helicopters, which in turn allows officers to make quicker and more accurate decisions based on what advance units are doing.

Go pass

Public transit gets on the bus with smartphone ticketing

Dallas-Fort Worth and Portland are among the latest to let customers buy bus and rail tickets with their smartphones, and riders are responding.

storm damage

After Sandy hit, Coast Guard comm got ... better

The TRIDENT mobile ad-hoc network, pressed into service after Superstorm Sandy, improved communications for a fraction of the price, and is now being deployed elsewhere.

GPS

Juniper app works to correct GPS errors

The app, which works with the company's Mesa Geo rugged notepad, takes into account a user's mode of transportation in considering the accuracy of signals.

Colorado

DISA's satellite-comm device helps with Colorado flood efforts

The SHOUT Nano, a pocket-sized Iridium communicator and tracking device, is being used by the Army Air National Guard for to keep troops in touch.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.