Local officials say that expanding access to broadband not only attracts new people and companies but also inspires innovation from existing residents and businesses, ultimately creating jobs and other economic opportunities.
As the U.S. outlines new rules for driverless car development and safety, Chinese researchers uncover vulnerabilities that can be exploited from 12 miles away.
DIG IT AWARD FINALIST: CLOUD & INFRASTRUCTURE
Rather than simply modify existing systems, the Labor Department’s Employment and Training Administration rapidly developed a cloud-based platform that integrates grants’ performance and financial systems.
DIG IT AWARD FINALIST: CYBERSECURITY
HHS' low-cost, open-source 2FA solution protects users who connect to GrantSolutions.gov -- and is poised to do even more.
Although states have strengthened their defenses against hackers and cybercriminals who attack their computer networks, officials admit they’re not fully prepared for increasingly complex threats that could expose the personal information of their residents.
Apple's exclusive bug bounty program is one that federal agencies -- particularly the most risk-averse -- could embrace.
The real emphasis, according to Assistant Secretary of Cybersecurity and Communications Andy Ozment, should be on building in cybersecurity "from the get-go" on the next generation of systems.
Although cybersecurity is being woven into the fabric of government, it’s not appropriately funded, a new survey from NASCIO and Deloitte finds.
The city is using PageFreezer to create a searchable archive of six websites and 75 social media accounts.
DIG IT AWARD FINALIST: MOBILE
The Eagle Directed Identification Environment gives all 12,000 Immigrations and Customs Enforcement agents the ability to collect biometric data in the field using their agency-issued Apple iPhone and a pocket-size Bluetooth-connected fingerprint scanner.
The state plans to engage technology vendors to help businesses and state agencies use blockchain technology to distribute, share, and save ledgers and contracts.
Organizations are not monitoring data movement in the most vulnerable places, a new McAfee Labs Threats Report suggests.