Apple iPad

Tablets for government: Apple iPad

The iPad's bright display and long battery life may not compensate for its limited processing power and number of ports.

Dell Latitude 10 Enhanced Security

Tablets for government: Dell Latitude 10 Enhanced Security

The Latitude's user authentication features will please admins, but users won't love the limited battery power.

Microsoft Surface Pro

Tablets for government: Surface Pro from Microsoft

The Surface Pro from Microsoft could be a popular choice among government IT administrators, given its large, clear display and processing power. But its larger size and weight might make it less popular among some end users.

Lenovo ThinkPad Tablet 2

Tablets for government: Lenovo ThinkPad Tablet 2

Lenovo's ThinkPad Tablet 2 is a Windows 8 Pro tablet with good battery performance well-suited to the agency user who needs a near-desktop experience while operating remotely. But its prior-version USB port might be a hindrance to those using many newer peripherals.

Crittercism Fathom Mobile Command Center

How's your app performing? Fathom does a deep dive

Crittercism's Fathom Mobile Command Center offers a way for agencies to track the performance of increasingly complex mobile applications.

Monroe Mobile app for disaster assessment

App provides disaster assessment on the fly with ArcGIS Online

A Michigan county is using WebMapSolutions to build a mobile app that provides faster, more complete damage assessments.

The technology that goes into smartphones

Smart phone: 30 years in the making

The technology behind smart phones can be traced back to GCN's beginnings, and further, into government research projects. Here's a brief look at what's behind a smart phone's key components.

Service member with an iPad

DOD building its own secure 4G wireless network

The Pentagon expects to have its own network up and running by next year, as part of its new push for better cybersecurity.

Man texting for help in front of a brush fire

Next steps in making text-to-911 a reality

Major wireless carriers already have committed to delivering text messages to 911 by May 2014, and the FCC is considering rules to expand the requirement to all carriers and third-party providers.

Mobile phone and tablets

Just what does NIST consider a mobile device?

Any guide to mobile technology is a work in progress.

A mobile phone that someone lost on the beach

Mobile security guide: Assume a device will fall into malicious hands

NIST has updated its guidance for securely managing mobile devices, addressing advances in the technology and the move toward BYOD since its original publication in 2008.

Peeking into phone metadata

NSA's intell gathering puts the spotlight on metadata

Metadata is valuable for extracting knowledge from smaller subsets of data for intelligence-gathering as well as for energy, weather and public safety research, experts say.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.