Government agencies need visibility along the full attack continuum – from point of entry, through propagation and post-infection remediation.
The Good Technology Mobile Workflow Builder lets IT managers select mobile enterprise apps and combine them into business processes to better manage their users' mobile work experience.
DARPA demos an all-silicon, microchip-sized transmitter that sets the stage for wireless communications to multiple systems from a single chip.
The National Cancer Informatics Institute is launching NCIP Hub, an online collaborative forum based on HUBzero, a platform for creating dynamic websites for researchers.
Thoreau, a golden retriever, has been trained to find hard drives, thumb drives and other tech devices for the Rhode Island state police.
While big data tools are very powerful, the results they deliver tend to be only as good as the strategy behind their deployment.
The IT systems for the Air Force National Capital Region are moving to a virtualized shared computing environment that has produced cost savings up front and promises improved performance in the coming years.
The company’s system will help public health departments and health care providers quickly identify and predict sources of foodborne illnesses.
The Federal Bureau of Prisons is looking for e-discovery solutions that can be securely used by inmates to view legal materials related to their cases.
How can government best position itself against cyberattacks, which seem to be increasing both in number and sophistication?