While the IC’s research organization looks into adding security to cloud environments, in the here and now, intelligence agencies are sharing more data.
IT leaders pioneer ways to manage the diverse services they receive from a variety of providers.
Mobile devices arrive as fully featured tools, allowing agencies to deploy them both in the field and in the back office.
As tablets and smartphones become more sophisticated and widespread, agencies need more powerful MDM tools to keep them secure.
Agencies put continuous monitoring into action as they work toward a comprehensive cybersecurity strategy.
Even in an era of cloud migrations and consolidation, agencies are establishing new data centers to take advantage of the latest technologies.
NASA’s Jet Propulsion Lab has deployed cloud computing for a variety of projects. Here is the agency’s advice for effective implementation.
This suite delivers mobile device management, productivity apps and a bridge to legacy software.
Microsoft’s latest offering combines the portability of a tablet with the productivity of a notebook.
Increasingly sophisticated threats demand that agencies effectively implement powerful security technologies.
IT managers can improve wireless network performance and increase user satisfaction with a few simple steps.
Cloud-based services enable agencies to reduce costs and ease the burden of provisioning applications.
As fabrication technology matures, agencies are finding innovative uses for it.
A bird’s-eye view of agencies’ security posture can provide deeper understanding of the threats they face — and how to address them.
Endurance is essential as agencies deal with the never-ending challenges of technology.
Unless agencies adopt VE with conviction, it’s unlikely to have a lasting impact.