TECH - ALL ARTICLES

Results 3011-3020 of 6617

Five Things You Could Buy for the Price of an F-35

How $180 million could improve national security.

Risky Business at IRS When It Comes to IT Security, IG Finds

Risk-based decision-making describes the tradeoffs an agency makes -- or doesn’t make -- when confronted with a potential cyber vulnerability.

Policing the Cloud: We Should Expect More from Law Enforcement Cloud Providers

What controls exist to protect privacy and secure records from unauthorized access?

DHS Drafts Blueprints for Self-Repairing Networks as Hacks Mount

Resiliency is the key to preventing the attackers from finding sensitive information or disrupting activities, experts say.

A self-portrait taken by the NASA rover Curiosity in Gale Crater on Mars.

Of Asteroids and ETs: How Cloud Innovation is Driving Space Exploration

In just a few years, cloud computing could help aid the search for extraterrestrial life.

Keystone State Aims to Kill the Password

The commonwealth's login network could help secure online shopping and other e-commerce services worldwide.

Federal Customer Experience 'Downright Bleak'

Six federal agencies earned an average of “very poor." HealthCare.gov scored the lowest.

Why Big Data Needs ‘Dummy Data’

Instead of original data, a structurally similar but obscured version of the data, or “dummy data”, is used for development and testing environments.

Telework on Trial? House Committees to Probe Patent Office Telework Fraud

The House Oversight and Government Reform Committee and the House Judiciary Committee team up for a joint hearing next week.

A specialist holds a hard drive seized during the Gulf War, at the Defense Computer Forensics Laboratory, Wednesday, Sept. 10, 2014, in Linthicum, Md. The DCFL is ground zero in the nation’s fight against cybercrime.

Why Veterans Make Good Cyberwarriors

Putting returning warfighters back to work as cyberdefenders makes sense, advocates say.