Perfect for educational environments, the core of the Sprout is an all-in-one computer with a fast, Intel Core i7 processor, plenty of RAM, a high-end Nvidia GeForce video card and a terabyte- sized solid-state hard drive. Standard peripherals like a mouse and…
The Web Application Firewall from Barracuda Networks does an excellent job of covering the entire cybersecurity waterfront, or at least the parts that administrators feel need the most protection. It’s so robust, you probably shouldn’t think of it as just a firewall.
In a NextGov column last year, I predicted that drones would step up to a new public safety role, with both officers and public volunteers piloting the craft. With amazing drone rescues saving lives, that future is close at hand.
To celebrate Veterans day, our sister publication is taking to the skies in Bomber Crew, a fun new game that celebrates and simulates the achievements of the brave soldiers of the Army Air Corps of World War II.
Explore a dystopian world in which technology has advanced well-past our collective humanity in Observer, a clever cyberpunk and sci-fi adventure videogame starring Blade Runner’s Rutger Hauer, and just about every human vice you can imagine.
Micro segmentation is one of the most advanced security methods that organizations can employ to protect critical assets, users, and data from both outside hackers and malicious insiders. But it has to be done right. Find out if GuardiCore Centra is up…
Using a threat hunting platform like Sqrrl may take a little bit of a shift in thinking for cybersecurity teams. It’s less like being a beat cop and more like being a consulting detective, but arguably much more effective at catching the…
Unfortunately, we don’t yet have technology that can prevent a storm of the magnitude of Hurricane Harvey from devastating our cities and towns. But it can help in the response, and even provide valuable information for citizens trying to survive a catastrophic…
The Waratek Application Security Platform relies on just-in-time compiling and focuses exclusively on one of the biggest security risks within most organizations: applications running Java. Find out how the new technology worked in CSO magazine.
It’s clear that BlackBerry is attempting to recapture some of it’s past glory with the KEYone, while also addressing their historical shortcomings. I was able to spend some time evaluating it for government suitability.
