State & Local
Embracing open source software may save money and time, but at a cost: Users may have to change processes. IT departments have to take over maintenance chores that might otherwise be the province of a vendor. But with vibrant user communities, many open source solutions are every bit as good – and sometimes better – than commercial alternatives.
Security tops the concerns of federal information technology managers as they look to move data and applications into the cloud – and that’s consistent with other public sector IT executives.
For organizations looking to make sense of their data, the first step is to ensure the data are managed well – are consistent, accurate and that rules are in force to keep users from doing anything to undermine data integrity. But whether you’re trying to ensure data quality going forward or clean up a whole history of sloppy data, the choices in the marketplace can be bewildering.
Talking Tech Videos
What We’re Reading
Privacy invasions related to the internet of things (IoT) are already becoming reality. In Arkansas, local law enforcement is trying to access the records of an Amazon Echo device as evidence in a murder investigation and has already compiled evidence based on the files of an IoT water heater.
Security experts have long fretted about the rapidly expanding number of internet of things devices. While most such tools may not contain data that should be protected, many connect to the cloud and represent easy targets for hackers to gain access — not only to that device, but to all other devices connected to an IoT mesh.
The government’s eye in the sky is working on a way to understand more about what’s happening inside its own workers’ heads.
The General Services Administration-run cloud.gov hosting platform has completed the final stage of Federal Risk and Authorization Management Program assessment.
The Department of Homeland Security’s sharing of cybersecurity-related information with federal and nonfederal entities could be improved by assessing and optimizing a specific department component, according to a recent report from the Government Accountability Office.
The Internet of Things is composed of countless online connections. And while these connected IoT devices promise so many exciting benefits, the “brave new world” of IoT can also result in new vulnerabilities for cyberattackers to compromise an organization’s infrastructure. And nowhere are these security concerns more critical than in the healthcare and pharmaceutical industries.
The research firm offers five cybersecurity predictions for 2017, ranging from Internet of Things devices to Trump facing a cyber-crisis.
President Donald Trump’s Jan. 27 executive order restricting citizens of seven Muslim-majority nations from entering the U.S. for three months also pressures the Department of Homeland Security to develop its biometric entry/exit system in double-time.
One of Donald Trump’s first actions as president was to sign an executive order implementing an across-the-board hiring freeze in federal government.