October 3, 2017
By Theresa Payton
Nearly every business has an app, and if the app is not secure, neither is the business.

Apps are one of the main channels consumers use to interact with your business, and nearly every business has one. Because of this, apps are an evident touch point of vulnerability. Cybercriminals have become increasingly sophisticated over the past few years, making app hacks difficult to spot. In fact, most organizations find out too late they’ve been hacked and are left to deal with damage control.

But how can you tell if your company’s app has been compromised? Keep an eye out for these three clues in your everyday operation:

The app isn’t acting by design.

December 13, 2016

Federal employees are frustrated by slow and unreliable applications, a quandary they say impedes them from getting their work done and diminishes confidence in information technology modernization efforts, according to survey results released today by Riverbed Technology, an application performance company.

Of the 335 federal employees surveyed, nearly a third said it takes more than 24 hours for agency IT managers to address application failures, despite clear processes in place to report problems.

June 29, 2016
By Marcella Cavallaro

Big data is prevalent across the federal government, particularly the policy-shaping power of new data streams and better constituent information. Two years ago, President Barack Obama signed into law the Digital Accountability and Transparency Act (DATA Act) that prioritized making public government data in an effort to bring transparency to federal processes and harness the collective power of information. The law gives the public  access to data about the nation’s populations, regions, services, economic opportunities and more that can be used by everyone—from local governments and citizens to private business and state agencies.

May 2, 2016
By Joel Dolisy

In World War I, the U.S. Army used lumbering GMC trucks for the first time in combat—revolutionary for its time. Today, these vehicles would be considered slow, cumbersome and archaic in comparison to today's fast, powerful and, most of all, constantly connected warfighting machines.

In fact, thanks to the Internet of Things (IoT), just about everything that can be connected—from tanks to smartwatches—is connected. The Defense Department’s whole work force depends on thousands of devices that work off of disparate operating systems. The net result is a security risk nightmare for those who must secure government IT networks.

November 1, 2015
By Col. James Ross, USA, Dave Williamson and William Wygal
Product Manager Handheld, Manpack and Small-Form Fit engineers perform tests on the manpack radio in the Unified Lab for Tactical Radios–Army (ULTR-A) facility in Maryland. The ULTR-A lab is used for radio and waveform testing and integration.

The ubiquitous catchphrase “there’s an app for that” applies even to the U.S. Army. However, soldiers toss around the term waveform rather than app. Waveforms, which connect soldiers to the Army network through radios, are similar to apps because they allow communication via voice, data, images and video.

Waveforms draw on available spectrum to implement functions needed to operate software-defined radios, providing a secure method for troops to receive and transmit information in various forms. An open architecture of cutting-edge radio waveform technology lets multiple systems communicate and increases joint interoperability.

July 15, 2015
By Davis Johnson

In the U.S. Defense Department (DOD), networks carry critical information and applications from a data center to the battlefield. Ensuring the apps travel quickly and securely over the vast networks is not only mission-critical—it can mean the difference between life and death.

Compounding the challenge, DOD organizations collect, analyze and share more data than ever before. Data center consolidation drives efficiency gains but requires applications to travel greater distances to a work force positioned around the globe. The increased data, traffic and distance puts a serious strain on already-stressed networks.

January 28, 2015
By Ed Bender
In this file photo, Marines develop their private cloud, focusing on ensuring the right access for the right people.

With 2014 in the rearview mirror, federal agencies now are looking ahead to what the next year will bring. For information technology (IT) professionals working in the U.S. Defense Department and intelligence community, 2015 will be the year of the cloud, application stacks, security challenges and centralization. How will each of these trends develop and impact government information technology infrastructures? Here is a look at a few changes in IT that will affect federal IT pros in 2015.

September 23, 2014
By Chris LaPoint

When your personal applications are slow, there’s no doubt it’s frustrating. The news clip buffers, the song won’t download, a game takes ages to start up, etc. But when apps perform slowly for military, intelligence or other critical government entities, national security might, in fact, be at risk.

November 30, 2011
By George Seffers

Engineers from the University of Missouri College of Engineering, with funding from the U.S. Army/Leonard Wood Institute, are in the early stages of enhancing popular smartphones to be able to find and track military targets. The goal is to provide the exact location of a remote target, through either sound or sight using the technology available on commercial phones. The software application could be useful in cases where tracking lasers would be visible to the enemy.