mobile devices

Contrary to the predictions of many security experts, who argue that cloud exploits, mobile device attacks and all-out cyber war will be among the most likely data breach threats governments and enterprises will face in 2013, researchers for the Verizon Data Breach Investigations Report (DBIR) have reached a far different conclusion.

The most likely threats in 2013 will involve authentication attacks and failures, continued espionage and “hacktivism” attacks, Web application exploits and social engineering. Keep reading →

The drive toward mobile technology reached race car speeds this year. Keep reading →

The District of Columbia’s Public Service Commission recently joined the emerging ranks metropolitan government agencies delivering service information to the public via a mobile application.

“The PSC is proud to be one of the first public utility commissions in the country to provide a mobile app to consumers,” said Chairman, Betty Ann Kane. “With a single tap of the finger, District residents will have faster and easier access to information that impacts their daily lives.” Keep reading →

The Defense Advanced Research Projects Agency (DARPA) is beginning work to develop a wireless communications system capable of transmitting data at speeds of 100 gigabits per second, rivaling high-speed fiber optic systems.

The technology is also intended to get around one of the biggest hurdles facing tactical military communications: the effects of weather degrading high-bandwidth transmissions between aircraft and ground stations and vehicles. Cloud cover is one of the big challenges facing high-bandwidth air-to-ground data communications, DARPA officials said. Keep reading →

What seemed like a simple objective, to develop and issue a standardized, electronically-verifiable identification card for civilian agency personnel, continues to encounter a barrage of technical and cultural challenges at a time when identification has become a critical component in the government’s efforts to embrace mobile and remote computing.

Despite the government’s aggressive push under the Identity, Credential and Access Management (ICAM) plan, only three departments are above minimum fielding levels and using the civilian personal identity verification (PIV) cards, said Paul Grant, director for cybersecurity policy in the Office of the DOD Chief Information Officer. And it remains unclear when the cards will be universally fielded across the civilian government. Keep reading →

The Department of Defense is taking a leadership role in leveraging mobile device technology to improve information sharing, collaboration and efficiencies. In a recent press release, Teri Takai, DoD’s chief information officer, said “As today’s DoD personnel become increasingly mobile, a wide variety of devices offer unprecedented opportunities to advance the operational effectiveness of the DoD workforce This strategy will allow mobile devices across the department to converge towards a common vision and approach.”

There are significant challenges that await agencies, like the DoD, that are looking to implement mobile strategies and “bring your own devices” (BYOD) policies – the most daunting being security. In order to overcome various security challenges, agencies must take several factors into consideration. The five tips found in this piece will outline crucial items for agencies to consider when adopting mobile practices for their employees: Keep reading →

Large-scale software and database tools can help private firms and federal agencies verify identities and avoid fraud, even in this online age of fake personas and criminals who front companies online.

Although known as a consumer credit reporting agency, Equifax uses such tools to verify identities as a key part of the credit checking process. Rich Huffman, senior director of product management at Equifax explained the process at this week’s Government Information and Analytics Summit in Washington, D.C. Keep reading →

How networks of public and private sensors can change how the public sector operates during routine or emergency operations.

It’s 1991, and some computer science professors are tired of walking into their computer lab of the University of Cambridge only to find an empty pot of coffee. Their solution: install a camera and connect it to the server so they could ascertain the status of the coffee pot from their desks. The rest is internet history. Keep reading →

It’s easy to take all the comforts of our modern lives for granted. Cars are basically parking themselves these days, and Wi-Fi on airplanes allows us to watch our favorite shows as we zip across the country in a matter of hours. Mobile devices can talk to and interact with us like humans – not to mention letting us securely accomplish our work from anywhere and at any time.

We sometimes forget that things haven’t always been this way. December 17 marks the 10-year anniversary of the E-Government Act of 2002 – America’s first step toward a modernized and accessible IT infrastructure.
_______________________________________________________________________ Keep reading →

The Department of Veterans Affairs will stand up a series of internal and external mobile apps in January to deliver veterans programs and help employees do a better job of delivering benefits.

Up to 100,000 employees handling patients’ clinical information and veteran’s benefits eventually will be able to access the mobile apps to manage records while moving around units and facilities, VA CIO Roger Baker said, easing and streamlining processes and eliminating delays that have often characterized the VA’s handling of benefits. In addition, mobile apps for veterans will offer easy access to benefits and claim status. Keep reading →

Page 1 of 912345...9