government - News, Features, and Slideshows
- US proposes tighter export rules for computer security tools
- US senators stall vote to extend NSA phone records dragnet
government in pictures
The U.S. Senate was deadlocked on Friday over whether to extend authorization for the National Security Agency's massive collection of domestic telephone records, with Majority Leader Mitch McConnell insisting the surveillance program should continue with no new limits.
By Grant Gross | 23 May, 2015 03:15
The U.S. Senate on Thursday failed to move forward on efforts to extend the section of the Patriot Act that the National Security Agency has used to collect millions of domestic telephone records.
By Grant Gross | 22 May, 2015 08:34
Senators block vote to extend NSA powers... healthcare hack hits 1.1 million victims... Apple fixes security flaws in Watch... and more tech news.
By IDG News Service staff | 21 May, 2015 21:22
The U.S. Commerce Department has proposed tighter export rules for computer security tools, a potentially controversial revision to an international agreement aimed at controlling weapons technology.
By Jeremy Kirk | 21 May, 2015 15:25
The Federal Communication Commission's 400-page official order on net neutrality, released Thursday, will undoubtedly elicit lawsuits on various fronts once it is officially published in the Federal Register.
By Matt Hamblen | 14 March, 2015 01:01
A flurry of activity will follow the plan from U.S. Federal Communications Commission Chairman Tom Wheeler to reclassify broadband as a regulated public utility as the foundation for new net neutrality rules.
By Grant Gross | 06 February, 2015 06:47
In the debate over net neutrality, AT&T and Cisco are warning that fiber optic cable rollouts could be delayed -- and revenues lost -- if President Obama's recently proposed rules move ahead.
By Matt Hamblen | 14 November, 2014 23:15
With Europe's top court ordering Google to allow people to basically edit their online personal histories, some wonder what this will mean for finding the truth online.
By Sharon Gaudin | 15 May, 2014 06:23
Whitepapers about government
More and more government agencies are turning to a BYOD strategy. While this can make more transactions mobile and potentially decrease IT costs, they may also make the agency vulnerable to security breaches. •One of the biggest threats is social engineering, a process by which an adversary tricks the user into offering up information or access rights. •While there are several types of social engineering to be on the lookout for, there are three dominant attacks to watch •As agencies debate expanded device and data management policies, creating a divide between personal and professional content is essential
Axon wanted to win more business by reaching out to CIOs and key technology decision makers with more flexible, affordable and easy-to-manage disaster recovery solutions.
Communications service providers (CSPs) are struggling with an explosion of data traffic resulting from increased mobile usage, streaming video, resource-intensive over-thetop (OTT) applications, and smart device proliferation. At the same time, CSPs must deploy new network technologies and services to stay competitive and satisfy customers.
- US Senate blocks NSA surveillance reform bill
- Amazon rules Gartner's magical box
- Google gives Android developers new tools for tracking app performance
- Microsoft offers Windows 10 carrot, threatens with stick
- US Senate leader pushes to extend NSA phone dragnet
- IBM defends use of temp visa workers
- Marines test augmented reality battlefield
- Pebble Time smartwatch to begin shipping on May 27
- Adblock browsers for Android and iOS to keep mobile ads, tracking at bay
- Torque G02 smartphone doesn't mind a saltwater dunk
- The Upload: Your tech news briefing for Friday, May 22
- Factory reset in Android phones leaves sensitive user data behind
- Secom security drone follows, photographs intruders
- Alibaba's UC Browser found leaking users' data
- Freelance hacking site vows to clean up dodgy listings