Border Security Concerns Aren’t Limited to the South Border Security Concerns Aren’t Limited to the South
Border Security Concerns Aren’t Limited to the South
Jason Miller 250×250
USNI News: 250×250
NITEC17 250×250
gdit cloud 250×250

Sign Up For Our Newsletter

Fields marked with an * are required

Stay informed!
Get GovTechWorks delivered to your inbox

Tom Temin 250×250
NITEC17 250×250
GM 250×250
GEMG 250×250
AFCEA Bethesda: Law Enforcement and Public Safety Technology Forum 250×250

Latest Articles

Women Crack Code on Intel, Cyber, Tech Jobs, Despite Growing STEM Shortage

Women Crack Code on Intel, Cyber, Tech Jobs, Despite Growing STEM Shortage

Women make up just 11 percent of today’s global cyber workforce, only about 15 percent of U.S. engineers and only 20 percent of computer programmers. Yet despite a shortage of women in science, technology, engineering and math, women do seem to have cracked the code as leaders in military cyber, intelligence and technology.

Upcoming Events

Homeland Security

Border Security Concerns Aren’t Limited to the South

Solving the southern border will affect security in other parts of the country, as well. Re-Locatable Video Surveillance Systems offer the kind of flexibility the U.S. Border Patrol needs to put resources wherever they’re most needed.

Read More

What's New

Sensors and AI Will Reinforce Border Wall

The 50-foot border wall President Trump promised in the campaign will actually be a 2,000-mile technology project, combining walls and other barriers with radar, day and night cameras on poles and buildings, and artificial intelligence technology to help border agents stop terrorists, smugglers and migrants from illegally crossing into the United States.

Tom Temin 300×600

Talking Tech Videos

What We’re Reading

DISA’s Plan to Replace CAC to Come Together This Year

When former Defense Department Chief Information Officer Terry Halvorsen talked about moving on from the Common Access Card (CAC) as the main approach to network authentication, many observers scoffed at the idea.

Halvorsen, who recently joined Samsung as an executive vice president focusing on mobile enterprise strategies and helping to navigate government and regulatory business affairs, envisioned and set as a goal last June for the next authentication technology to be more agile and less costly.

Army Releases New Cyber, EW Field Manual

The Army is getting up-to-date on cyber and electromagnetic activity policies, finally releasing the long-anticipated updated field manual for cyber and EW functions. The document, titled FM 3-12 “Cyberspace and Electronic Warfare Operations,” and dated for mid-April, though publicly released within the last week, replaces FM 3-38, which provided the initial guidance back in 2014.

That Was Fast: Thousands of Computers Now Compromised With Leaked NSA Tools, Researchers Say

Thousands of Microsoft Windows machines worldwide are infected with an NSA-developed backdoor that hackers installed by reusing leaked executable code from an outdated hacking toolkit belonging to the spy agency, multiple security researchers tell CyberScoop.
Halvorsen, who recently joined Samsung as an executive vice president focusing on mobile enterprise strategies and helping to navigate government and regulatory business affairs, envisioned and set as a goal last June for the next authentication technology to be more agile and less costly.

DISA wants advice on building secure OPM background check system

The agency tasked with building the government’s new background investigations system is looking for industry insights on its capabilities.

The Defense Information System Agency unveiled an updated request for information for the National Background Investigation System on April 4, seeking feedback for what capabilities are on the market to help handle the government’s background investigation apparatus.

Any IoT Device Can Get Hacked — Even Dishwashers

Cyberattacks know no bounds.

With the increasing amount of connected devices, it seems that the ways in which things in the Internet of Things (IoT) can be breached also rises. From smartphones to home lighting systems and locks, there are a myriad of items that are becoming more and more connected each day.

Army Reviews Its IT As Chief of Staff Shows Interest

Lead by its chief of staff, the Army is taking an end to end look at its IT.

While the Army for some time has been undergoing a number of network modernization initiatives, the service’s lead in that department, Maj. Gen. Garrett Yee, said Army Chief of Staff Gen. Mark Milley has taken an interest in the Army network.