Security

Forget hackers, the fool next to you is the real threat

An analysis of reported data breach incidents shows that human error, not hackers, is the biggest threat to sensitive government data.

CIA venture arm targets a secure cloud platform

Following last month’s agreement with Adaptive Computing to develop a cloud operating system, In-Q-Tel invests in Huddle’s secure cloud platform.

Government's 7 top challenges to embracing the cloud

The Government Accountability Office recently released a report that assessed the progress seven agencies have made in implementing the Cloud First policy and came up with their seven top challenges.

Are security-savvy execs wary of the cloud?

Organizations with strong security practices are more likely to entrust their data to cloud providers, according to a recent survey by the Ponemon Institute.

CipherCloud encrypts data across multiple cloud apps

Connect AnyApp encrypts data in transit, in use and at rest for Web applications and services such as Salesforce.com, Gmail, Office 365 and Amazon Web Services.

Bitter end: XP users grudgingly give way to Win 7

Many rejected Vista and resisted Windows 7; what will they make of Windows 8?

What OS X Mountain Lion can do for the enterprise

As more agencies adopt Apple's mobile devices, the new OS' security, messaging and synch-ability could make the workplace more efficient and enjoyable.

NARA gets OMB directive: oversee revamping of fed records management

Records management framework will be based on cloud architecture, secure storage and analytical tools, according to an Office of Management and Budget directive.

Is it data or deception? US-VISIT needs to know.

Of all immigrants coming into the United States, about 825,000 fingerprint records at US-VISIT have multiple names and inconsistent birth dates.

How CDC's research cloud went virtual

After consolidating its servers CDC's research lab laid the foundation for managing a virtual infrastructure.

Dell unveils desktop virtualization tool for feds

Enterprise-class solution helps agencies manage “geographic sprawl” through greater mobility and ability to power almost any device virtually anywhere.

4 tips for making the leap to unified computing

Alaska's enterprise architect offers tips for overcoming migration hurdles to deploying so-called fabric or unified computing.

Army's 'Kraken' puts data from many sensors onto one screen

With troop drawdowns in Afghanistan, the Army will use computerized surveillance technology to improve perimeter security and help protect small units in remote outposts.

NASCIO's new plan: CIOs take the lead

Top state IT leaders have adopted a new strategic plan aimed at putting a stronger emphasis on CIO leadership.

New ‘Universal Gateway’ speeds data to Navy vessels

Office of Naval Research’s “network bridging system” moves data instantaneously between the combat system and the command and control network.

Continuous monitoring of IT favored in FISMA plan

A compromise version of Cybersecurity Act of 2012 backs continuous monitoring of government IT security over regulatory compliance in the Federal Information Security Management Act.

Too tired to vote? Don't hit that touch pad.

As a N.C. state legislator found out the hard way, errors caused by workplace fatigue can have decisive and sometimes irreversible results.