GSA looking to turn everything into a service
Everything-as-a-Service has emerged in the post-personal computer era as a cost-effective, streamlined way to buy IT services and solutions.
Everything-as-a-Service has emerged in the post-personal computer era as a cost-effective, streamlined way to buy IT services and solutions.
Phishing is the most common attack used against federal networks, so it's important to be aware of the latest techniques, even if they seem unlikely.
Office of Naval Researchâs ânetwork bridging systemâ moves data instantaneously between the combat system and the command and control network.
Former FBI official Shawn Henry said government understands the need to be more forthcoming with cyber intell, but creating the necessary legislative and policy framework is complex.
This year's Black Hat Briefings will tackle OS security â or lack of it â in Windows and iOS. Mobile devices and industrial control systems get a lot of attention, too.
The system integrates DataDirect Networksâ Web Object Scaler cloud storage appliance with YottaStorâs mobile computing and big data storage system called YottaDrive.
Security in the latest version of Microsoftâs operating system beats previous releases by âleaps and bounds,â according to researchers at the Black Hat Briefings.
Alaskaâs Enterprise Technology Services team used a unified computing system to quickly move existing services to a new data center, and validated its disaster recovery approach and failover capabilities in the process.
For most agencies, server virtualization is a first step toward cloud computing. If you do it right, a move to the cloud is that much easier. However, if you make a mess of it, your journey to the cloud could be tougher.
Sen. Lieberman introduces cybersecurity bill that offers limited liability for sharing threat information and emphasizes continuous monitoring of government IT systems.