-
Ghost in the data center: Tips for managing wireless sensor networks
November 30, 2017 | NewsNetwork monitoring tools can be used to forecast device scalability and threshold alerts, allowing managers to act on the information that sensors are sending out.
-
Creating mobile security standards
| NewsAgencies are moving forward with security standards for cell phones and mobile apps under a pair of recent policy directives.
-
FAA pushed to protect airspace from rogue drones
| NewsAs a new report warns small UAS can do far more damage to planes than bird strikes, legislators worry that "idiots who have toy drones" will delay legitimate UAS uses.
-
Are states prepared to protect the next election from hackers?
| NewsA House panel heard from several experts who offered recommendations on securing elections infrastructure.
-
The race for the fastest supercomputer
November 29, 2017 | NewsChina's Sunway TaihuLight has a commanding lead in the high-performance computing race.
-
Cybersecurity breaches: It’s time to break the silence and work together
| NewsThe more we promote intelligence sharing and the tools and processes to enable it, the more we all benefit from shared situational awareness, improved security posture and greater defensive agility.
-
Virginia looks to IT startups for tech infusion
| NewsA new program would identify and evaluate businesses whose IT services and expertise could provide value to state agencies.
-
Memo charges Chinese-made drones with snooping
| NewsA memo from Immigrations and Customs Enforcement's investigative arm claims small DJI drones were most likely downloading sensitive data they gathered in the U.S. to the Chinese government's cloud.
-
How Seattle coordinates road construction projects
November 28, 2017 | NewsA construction planning application is helping city officials manage road projects more efficiently and logically, saving money for both the city and industry partners.
-
6 must-haves for a secure enterprise file-sharing solution
| NewsA robust file sharing solution lets agencies maintain a strong content security and governance posture without hampering users’ ability to get their work done.