New York City's Cyber Command built an open-source, cloud-based data pipeline -- a security log aggregation platform that analysts use to quickly detect and mitigate cyber threats.
Small edge and fog networks can help increasingly dense and connected smart cities power the internet of things.
The small-town North Carolina summer destination spot uses FirstNet for police, fire and surf rescue operations when the summertime population swells to 30,000.
The cloud deployments are part of NNSA's ongoing efforts to mitigate cybersecurity risks for some of its non-nuclear IT systems through common platforms.
Liveness detection reduces the risk of spoofing by using advanced technologies ensure that biological identifiers are from the proper user and not from someone else.
Researchers have developed an algorithm stress test that creates powerful visualizations of a problem, showing all scenarios or examples an algorithm should consider for comprehensive testing.
While spam is taking advantage of artificial intelligence to create more deceptive communications, it is also vulnerable to attack.
Despite enthusiasm for more privacy rules by legislators and their constituents, many states found themselves bogged down this year in both the details of high-tech operations and industry complaints.
Use cases help agencies adopt more mature data practices, which paves the way for iteratively developing new, more innovative applications that deliver even greater value.
A Federal Claims Court judge found the Defense Department used a faulty legal justification the decision to make JEDI a single-award contract, but it ultimately made no difference in DOD's ability to award its $10 billion Joint Enterprise Defense Infrastructure contract.
Sign up for our newsletter.