Attracting, retaining and developing key IT talent remains the top challenge among federal chief information officers and chief information security officers, according to a new survey.
The way to handle a cyber threat is not by harnessing the enormous amounts of data the United States collects on similar hacks, according to an unlikely source -- a former US intelligence cyber chief.
The Secret Service is purchasing software to watch users of social networks in real time, according to contract documents.
Every day, people, machines and the world’s growing multitude of sensors create more than 2.5 exabytes of data -- that’s a 2.5 followed by 18 zeros -- a bonanza of bits and bytes that is in many ways a double-edged sword.
Concerns about data compromises are partly to blame for drawing out an effort to merge roughly 2,000 dot-gov websites, according to federal officials and internal emails.
Securing America’s future in science, technology, engineering and math fields requires more than expanding opportunities for women.
The government should sponsor a national body to license cyber professionals and authorize cyber certifications, and then spin it off into an independent consortium, a military faculty member at the Pentagon's National Defense University said.
Since 1982, 37,000 people, including 7,000 Americans, survived potentially disastrous incidents because of the COSPAS-SARSAT rescue network. That record earned the satellite system an induction into the Space Technology Hall of Fame.
Analytics is often touted as a new weapon in the technology arsenal of bleeding-edge organizations willing to spend lots of money to combat problems. In reality, that’s not the case at all.
A fundamental overhaul of how federal agencies build and buy information technology systems passed the House for the second time in 2014.