The MCX will use SAS to perform cluster analyses, which will help it gain better insight into the unique and changing needs of the local population.
Agilance's Federal Risk and Authorization Management Program Content Pack includes the baseline security controls required of cloud service providers.
The GSA May 14 released a list of accredited third-party assessment organizations -- or 3PAOs for short -- that will do initial assessments and test the controls of cloud service providers per FedRAMP requirements.
An international effort by the Defense Department and the U.S. Navy is developing Web-based applications that will let allied navies share data in the fight against piracy on the high seas.
Georgia is using the LexisNexis Tax Refund Investigative Solution in a pilot program to mitigate identity fraud and has awarded the company a contract to continue the effort.
A conference on secure software development aims to raise the bar for attackers trying to compromise IT systems.
Is it just coincidence that unmanaged and unpatched software continues to be a major security problem?
After tornadoes ripped through nearby Springfield, the technology director of Dedham decided it was time to move data backup and recovery to the cloud.
A new security certification allows federal agencies to use Red Hat's Enterprise Linux 5 with the KVM hypervisor on IBM systems for a variety of command and control and secure operations.
Utah.gov has a new infrastructure that dynamically integrates data and information into a portal and delivers it in real time without the need for a Web content management system
A researcher examining early releases of Microsoft's new operating system says Windows 8 makes it harder to exploit vulnerabilities.
Voting is open for the International Space App Challenge.
Apple's CEO doesn't think people want powerful PC/tablet hybrids, but we think they do.
The department has a program to help develop technology for first responders, but matching the money with state and local agencies' requirements has proved difficult.
Current exploit in the wild targets IE for Windows, but Mac, Linux and Android also vulnerable.