Unfortunately, we don’t yet have technology that can prevent a storm of the magnitude of Hurricane Harvey from devastating our cities and towns. But it can help in the response, and even provide valuable information for citizens trying to survive a catastrophic event.
A new breed of threat is taking a different approach, setting up fake websites and apps that appear to be legitimate, but can be extremely dangerous to anyone fooled into trusting them. NextGov investigates those threats aimed at the United States Postal Service.
Two years after a data breach at OPM compromised personal information of tens of millions of current and former federal employees, agencies need to move from making short-term fixes to implementing long-term strategies. Learn how at Tenable Network Security.
The latest NextGov Emerging Tech column takes a look at several states that are supporting new driverless vehicle programs, and discovers the places where tractor trailers without drivers will soon be hitting the roads.
President Trump signs the long-delayed executive order on cybersecurity.
Rapidly evolving cybersecurity solutions can generate so many alerts that analysts and administrators can be overwhelmed. Standardizing, prioritizing and automating can make alerts manageable.
The innovative integrators at InfoZen know how to modernize IT for government agencies. The TWB recently interviewed their experts to create an amazingly detailed guide about how to modernize IT systems in the key areas of Cloud, DevOps, Cybersecurity and Mission Critical IT.
We wanted to see if the alleged hacking tools the CIA is supposedly using did in fact exist, or if doing things like turning TVs into spy devices was possible. So we loaded up some hacking tools and went to work. Find out what happened next.
Automation could be the answer to feds dealing with constant attacks, reducing the time from detection to remediation from months to seconds. The basic concept is simple enough, simply using the power of the network itself to counter threats, but the reality is a bit more complex.
The recent women’s march on DC showed the limitations of smartphone technology. During a crisis or an emergency, or in this case a massive protest march, cellular service can become overloaded. Here is what we need to do about that.