2015 is shaping up as a year when data analytics, ubiquitous video, and cyber forensics will force government IT managers to make decisions about how they deploy their resources.
The Air Force will start providing chip and PIN travel cards to protect against fraud and identity theft.
Big data, mobile and hybrid cloud technologies are creating challenging security environments for which half of organizations in a recent study had no disaster recovery plan.
Government mobility managers are racing to stay ahead of the proliferation of mobile devices with strategies that focus on data and applications rather than devices themselves.
No matter how useful antivirus software can be, its drawbacks are causing information security professionals to take a second look at antivirus protection – and the alternatives.
An automated multi-step identity authentication portal aims to cut down on fraud and waste by confirming the identity of clients at the time they are applying for benefits.
The new year will see a convergence of IT security and operations, as agencies spread responsibilities across IT departments and security tools become integrated into software lifecycles earlier .
A federal initiative to help departments purchase 50,000 body cameras for police in the wake of recent high-profile incidents of police violence is only the first step in creating a full video system. Departments will have to store and manage terabytes of data for years, sometimes decades.
After the wakeup call from the Sony hack, people inside and outside of government are taking a harder look at protecting their personal information – and vendors are ready with solutions from stylish privacy accessories to secure communications ecosystems.
Before the weather gets frightful – increasing the chances that you may experience significant system downtime – make sure you have a plan in place and follow these best practices.
Fujitsu introduced two 'enterprise-ready' Windows tablets this week, targeting government users who need extra security features.
The Defense Information Systems Agency released a draft of cloud computing security requirements for the Defense Department.
The provider of software-centric and cloud-focused load balancer solutions now supports integration with Defense Department environments using CAC authentication and Active Directory application infrastructures.
Tools and services are being chosen for Phase 2 of the Continuous Diagnostics and Mitigation program, which security watchers say could be a revolutionary step in how the government protects its information.