Sensors and AI Will Reinforce New Border Wall Sensors and AI Will Reinforce New Border Wall
Sensors and AI Will Reinforce New Border Wall
gdit cloud 250×250
Vago 250×250
USNI News: 250×250
AFCEA DC Chapter: Mobile Tech Summit 250×250

Sign Up For Our Newsletter

Fields marked with an * are required

Stay informed!
Get GovTechWorks delivered to your inbox

GM 250×250
GEMG 250×250
gdit cloud 250×250

Latest Articles

Battle Staffs Need More Cyber Training, Leaders Say

Battle Staffs Need More Cyber Training, Leaders Say

Military cyber operations capabilities are developing faster than planners and commanders can use them on the battlefield. This reality prompted a fresh look at classification and training to ensure battle staffs know how and when to employ cyber effects.

Virtualization Could Redefine the Way Your Agency Looks at Cloud

Virtualization Could Redefine the Way Your Agency Looks at Cloud

Software-defined data centers can be a cost-effective alternative to renting commercial cloud infrastructure. Defining the data center in software helps managers escape the tyranny of hardware to become more agile and efficient, while maintaining complete control over system security.

Four Cyber Trends To Watch in 2017

Four Cyber Trends To Watch in 2017

The four greatest cyber threats facing government institutions today are foreign hacks, botnet attacks, intelligence sharing and information manipulation. But 2017 may be the year government and industry make progress in exchanging threat information.

State & Local

Open Source is Safe, But Not Risk Free

Open Source software depends on crowd-sourcing security. And though it’s up to system owners to seek out and employ each fix as rapidly as possible studies show some vulnerabilities can remain unpatched for years.

Read More

What's New

Open Source Software Carries Hidden Costs

Embracing open source software may save money and time, but at a cost: Users may have to change processes. IT departments have to take over maintenance chores that might otherwise be the province of a vendor. But with vibrant user communities, many open source solutions are every bit as good – and sometimes better – than commercial alternatives.

Public vs. Private Cloud: 5 Trends to Watch

Security tops the concerns of federal information technology managers as they look to move data and applications into the cloud – and that’s consistent with other public sector IT executives.

Many Options to Help Clean Up Your Data

For organizations looking to make sense of their data, the first step is to ensure the data are managed well – are consistent, accurate and that rules are in force to keep users from doing anything to undermine data integrity. But whether you’re trying to ensure data quality going forward or clean up a whole history of sloppy data, the choices in the marketplace can be bewildering.

GEMG Tower

Talking Tech Videos

What We’re Reading

Dead Men May Tell No Tales, But IoT Devices Do

Privacy invasions related to the internet of things (IoT) are already becoming reality. In Arkansas, local law enforcement is trying to access the records of an Amazon Echo device as evidence in a murder investigation and has already compiled evidence based on the files of an IoT water heater.

Securing IoT Devices From Within

Security experts have long fretted about the rapidly expanding number of internet of things devices. While most such tools may not contain data that should be protected, many connect to the cloud and represent easy targets for hackers to gain access — not only to that device, but to all other devices connected to an IoT mesh.

Cloud.gov Clears FedRAMP

The General Services Administration-run cloud.gov hosting platform has completed the final stage of Federal Risk and Authorization Management Program assessment.

Why is IoT Security So Critical to Healthcare?

The Internet of Things is composed of countless online connections. And while these connected IoT devices promise so many exciting benefits, the “brave new world” of IoT can also result in new vulnerabilities for cyberattackers to compromise an organization’s infrastructure. And nowhere are these security concerns more critical than in the healthcare and pharmaceutical industries.

Can DHS Push Harder on Biometrics?

President Donald Trump’s Jan. 27 executive order restricting citizens of seven Muslim-majority nations from entering the U.S. for three months also pressures the Department of Homeland Security to develop its biometric entry/exit system in double-time.

----------------------------------------------------------------------->