A researcher at Michigan State University has developed technology that can generate electrical power to buried or implanted sensors.
Secure browsing topped a list of the most activated mobile applications in the last year, according to a report by enterprise mobile management firm Good Technology.
Dell unveiled a new version of its Cloud Access Manager, an access management tool that taps a new security analytics engine to streamline access to web applications and OpenID Connect-compliant mobile apps.
The new data sharing and analysis web portal aims to speed the development of predictive models and effective therapies for Alzheimer’s disease.
Now that most mobile platforms support near-field communications, government must be ready to interact with a world where financial transactions will be increasingly handled on smartphones.
While agency security challenges continue to unfold, IT managers will have to rely on existing technology solutions to help manage their ongoing and embryonic security threats.
Sources of threat information can be found both inside and outside an organization – not just in network monitoring logs and intrusion prevention systems.
The Defense Security Service and the U.S. Senate Sergeant at Arms issued requests for information for services that scan and gather threat information from multiple sources.
Detroit joined the ranks of cities replacing parking meters with an electronic parking system where drivers enter their license plate numbers to pay for parking time, not a parking space.
Identity systems – and the electronic formats for managing them – have become the top priority for safeguarding the government data attackers now target.