Since Osama bin Laden probably went offline in 2002, third-party cell phone calls may have hinted as to where he was hiding.
The Homeland Security Department's Science & Technology Directorate has introduced its first counterterrorism product produced under the System Efficacy through Commercialization, Utilization Relevance and Evaluation (SECURE) partnership program it has with industry.
Teleworking is moving beyond just letting agency employees work from home; it's becoming a key element in continuity-of-operations planning, efforts to reduce pollution, and plans to save billions on unneeded real estate.
The National Association of State Chief Information Officers has released a guidance document to help state governments adopt the National Information Exchange Model
The FCC proposes that the benefits of signal boosters outweigh disadvantages by improving wireless service in rural areas and in buildings.
Homeland Security Secretary Janet Napolitano outlines DHS efforts to help protect government and civilian cyberspace sectors but stresses the need for private-sector cooperation.
Yavapai County, Ariz., is larger than some states, with spotty mobile communications, but tools to boost the power of cellular modems bring data to sheriff's patrol cars through most of the sprawling county.
A recent study shows a "strong correlation" between the amount of interaction companies have with government and their level of IT security. But can an approach that works in Asia work in the United States?
Defense Department CIO Teri Takai cautions against jumping into the cloud without the right organization or strategy.
The commission granted first responders continued access to the 420-450 MHz frequency band for using rugged devices that transmit video feeds, though some limitations were added.
The United States is in the middle of the pack of countries implementing IT security measures, and a McAfee report suggests one reason why.
A pair of cybersecurity studies show how hackers and criminals adroitly adapt to a shifting IT environment while systems defenders stand still.
The pace of cyber espionage between China and the United States has accelerated in recent years, and China, with a campaign investigators call 'Byzantine Hades,' may have taken the upper hand, according to a Reuters report citing State Department cables and security experts.
Police agencies are using social networks to identify and capture suspects, but officers need to be careful about their own personal information when using the sites.
Dell and Evidence Talks attempt to lower the bar for forensics in the field with digital mobile forensics.