Innovative security, a friendly (for real) cross-platform interface, and handy support for telework and BYOD could do a lot for public-sector organizations
Using NIST's Security Content Automation Protocol in tandem with TCG's Trusted Network Connect architecture provides the benefits of two open standards to improve endpoint security.
NASA's Deep Space Network is getting overloaded, with missions already competing for time and bandwidth, and the situation will only get worse.
With computing costs coming down, agencies can unlock capabilities for analyzing and finding hidden value in data.
The government has specified a series of vetted cryptographic algorithms that can be used to verify the authenticity of documents and digital signatures. Here's how they do it.
The wireless Internet service, widely used in Europe, is being expanded in the United States by Internet2, the University of Tennessee and the National Science Foundation.
The winner of the five-year competition -- called Keccak -- will be a candidate for the new federal SHA-3 standard, but NIST scientists say it is not a replacement for SHA-2, which has held up better than expected.
For agencies that need secure voice over IP communications, Belkin has introduced a switch that offers certralized control over audio ports.
Agencies can receive cloud services from Lockheed's private and community clouds or cloud providers such as Amazon and Microsoft.
Energy and NSF's Big Data Challenge sets a series of competitions, the first of which will pay $3,000 split at least three ways, but it's not about the money for contestants.
Microsoft has reached a settlement with the operators of the 3322.org domain in China to “sinkhole” traffic to 70,000 malicious subdomains.
What do IT leaders have confidence in? Not government regulations, exit strategies or data privacy, according to a new survey.
The new ElitePad’s “Smart Jackets” add ports and a fold-out keyboard for laptop-like functionality.
Agencies speed up delivery of services, retire outdated software and systems and redeploy staff to other tasks by standardizing on Microsoft Dynamics.
A team from Indiana University frames PlaceRaider as a potential tool for burglars, but what if it got into government buildings?