Relocatable Remote Video Surveillance Systems (R-RVSS) can be picked up and moved to where they’re needed most as border activity ebbs and flows in response to CBP’s border actions.
Long-term big data projects demand developers take the long view because, as new technologies emerge, existing data formats can quickly become obsolete. Planning and design choices today are critical to ensuring you can adapt and adjust in the future.
The president’s executive order on cybersecurity emphasizes systems modernization and cloud as a first step toward emphasizing protection of data rather than the network itself.
Talking Tech Videos
What We’re Reading
As the federal government and IT security leaders investigate inadvertent disclosures of fitness and location data, can they employ those same concepts to encourage better cyber behavior?
How can federal agencies maintain the same level of data visibility in the cloud as in data in other government systems?
The biggest threat of the Spectre and Meltdown cyber vulnerabilities is the possibility they can breach virtual boundaries, gaining access to multitenant cloud environments.
In combination with human intelligence, artificial intelligence is the key enabling technology underpinning the Pentagon’s Third Offset Strategy.
Agile and DevOps software methodologies depend on automation’s torrid development pace and its ability to scan for flaws and test performance.
There were a total of 140 hacking-related data breaches reported lasts year to the Department of Health and Human Services’ Office of Civil Rights — a 24 percent increase over 2016’s 113 breaches.
Phase one of DOD’s cloud adoption directive will “leverage cloud technology to strengthen and streamline commercial operations within the department.”
After a DHS October mandate, just under half of federal agencies have adopted policies to track unauthorized phishing messages, an Agari cybersecurity study says.
Brief synopsis of article: General Dynamics Information Technology’s Robert Gilbert and Peter Howard spoke with Military & Aerospace Electronics about technology being used for border security and R-RVSS usage. (article is on page 10)