Totem Power’s tower features a flower-shaped canopy that houses a solar array to power the lights, communications hub and electric vehicle charging station in the stem.
Authentic8's Silo is now configured with DOD's public certificates, allowing for secure authentication of Common Access Card users.
Through the Commons Credits Model, the investigators at the National Institutes of Health use vouchers to purchase cloud services from approved vendors.
Agencies must be ready to protect sensitive government data from the potentially devastating hacking threats that loom just beyond the horizon.
After six months of conversations with firearms companies, experts and law enforcement, the Department of Justice issued specifications for law enforcement smart guns.
Using both Esri and open-source Boundless GIS saves the port money and reduces its business risk.
Rep. Will Hurd (R-Texas) says filling the federal CIO and CISO positions will be big first steps toward ensuring cybersecurity.
A modular system built with off-the-shelf software gives the Department of Human Services a platform it can expand to serve other agencies.
The distributed ledger technology may be able to manage and secure health information that flows back and forth among patients, doctors, insurance companies and federal agencies.
Allegations against contactor Harold Martin are a critical reminder that protecting against insider threats requires more than employee awareness.