State and local governments are beginning a major retooling of their telecom infrastructures, replacing legacy systems, boosting connect speeds and, with an array of state-of-the-art wireless devices, untethering deskbound civil servants.
GAO, however, has identified lapses of unmitigated influence and has said that the Defense Security Service does not have sufficient knowledge or controls in place to address the risks it presents.
After more than two years in Iraq, U.S. contractors involved in reconstruction work may have seen the peak of exorbitant costs of insurance and private security, even as insurgents continue their kidnappings, convoy attacks and suicide bombings.
Homeland Security Secretary Michael Chertoff's announcement last month that he would create a new assistant secretary post for cybersecurity and telecommunications has been warmly welcomed by the IT community. But amidst the applause, questions arise.
Computer Sciences Corp. won a two-year, $22 million task order to develop and support the Defense Department's Biometric Identification System for Access.
BearingPoint Inc. won a five-year contract to provide program management support to the organization that serves as the Defense Department's central repository of personnel data.
For a view of homeland security policy ideas espoused by Stewart Baker, the Homeland Security Department's new policy czar, look no further than his testimony to the 9/11 Commission.
FreeWave Technologies Inc., a designer and maker of spread-spectrum radios and wireless solutions for industrial, scientific, military and commercial applications, has a 1.3-GHz radio designed for the military.
When British authorities needed help matching bodies to missing persons reports following the July 7 London bombings, they turned to a Unisys Corp. software application.
Homeland Security Secretary Michael Chertoff's new requirement that first-time visitors to the United States provide 10 fingerprints -- rather than the two currently required -- is being applauded as a move toward more meticulous identification and better security.
The head of the CIA's venture-capital arm says misguided IT security policies have paralyzed the government's ability to share vital national-security data.