The latest NextGov Emerging Tech column takes a look at several states that are supporting new driverless vehicle programs, and discovers the places where tractor trailers without drivers will soon be hitting the roads.
President Trump signs the long-delayed executive order on cybersecurity.
Rapidly evolving cybersecurity solutions can generate so many alerts that analysts and administrators can be overwhelmed. Standardizing, prioritizing and automating can make alerts manageable.
We wanted to see how a modern Neural Network AI performed on an actual battlefield. Enter Boris, from Nival, which is breathing new life into a classic wargame. Blitzkrieg 3, originally launched in 2015, is back with an updated look, multiplayer, and of course that soon-to-be famous AI named Boris.
New and innovative security tools seem to be emerging all the time, but the frontline defense for just about every network in operation today remains the trusty firewall. Network World asked TWB author John Breeden II to test out several manager programs designed to focus the chaos of a typical firewall deployment.
According to some Berkeley researchers, the reason for the federal government’s cybersecurity workforce problem is that talented IT types don’t want to work in Washington.
The Dedicated Short Range Communications (DSRC) standard is being developed to support operational communications within and among vehicles. One security researcher says more thought needs to be given to securing DSRC and calls for an industry security framework.
Only two weeks remain to comment on the draft revision of the NIST Cybersecurity Framework, a document that has been widely adopted since its release in 2014.
The innovative integrators at InfoZen know how to modernize IT for government agencies. The TWB recently interviewed their experts to create an amazingly detailed guide about how to modernize IT systems in the key areas of Cloud, DevOps, Cybersecurity and Mission Critical IT.
We wanted to see if the alleged hacking tools the CIA is supposedly using did in fact exist, or if doing things like turning TVs into spy devices was possible. So we loaded up some hacking tools and went to work. Find out what happened next.