-
Online voting takes another hit
February 14, 2020 | NewsSecurity researchers at MIT reported several vulnerabilities in the Voatz mobile voting app, although the company vigorously disputed the findings.
-
CISA outlines its role in helping states with election security
| NewsThe Cybersecurity and Infrastructure Security Agency breaks down its coordination activities across four lines of effort: elections infrastructure, campaigns and political infrastructure, the American electorate and warning and response.
-
JEDI delay pushes back classified cloud provisioning
| NewsWhen a federal court hit the brakes on the Defense Department's Joint Enterprise Defense Infrastructure cloud program, it also slowed the testing and rollout of a new system that automates user authentication and security auditing for classified provisioning.
-
Solving the time-to-value data challenge
| NewsFaster time to insight requires near real-time searches of all types of data no matter where it’s stored: on current and legacy systems, locally or in the cloud.
-
Tool finds software update bugs in hours, not days
| NewsA deep learning tool reduces the size of performance-counter data enabling an algorithm to detect software anomalies after updates.
-
Smart city spending expected to increase almost 20% in 2020
February 13, 2020 | NewsWhile big cities represent nearly 30% of the investment, most of the growth will come from midsize and small cities spending $1 million or less on projects, according to IDC.
-
Charlotte takes e-scooter data for a test ride
| NewsAnalyzing trip data from three e-scooter companies gives city transit managers new insights into micromobility supply and demand.
-
Government revs up IT security automation
February 12, 2020 | NewsThe public sector is expected to be the fastest-growing user of automation in the next six to 12 months, a new survey finds.
-
Hackers could shut down satellites — or turn them into weapons
| NewsThe lack of cybersecurity standards and regulations for commercial satellites, coupled with complex supply chains and layers of stakeholders, leaves satellites highly vulnerable to hackers.
-
Army automates job matching
| NewsAutomation and deeper data on candidate qualifications is helping the Army better match an officer's talents and interests with a unit's staffing requirements.