Post-Amazon California: 2 Ways SMBs Can Adapt
Amazon.com is dropping its affiliate program in California, stripping some smaller businesses of a significant revenue stream. Here's two ways online retailers can keep the registers ringing.
Health Data Losses: Don't Blame Hackers
Physical theft and lost computing devices are responsible for most of the health data that has been compromised, not hacking, according to U.S. Dept. of Health and Human Services.
Who Bears Online Fraud Burden: Bank Or Business?
Two recent court cases with very different outcomes call attention to the uncertain--and potentially expensive--regulatory and legal environment for small businesses and their online banking security.
14 Cool Mobile Apps From Uncle Sam
From a NASA app that keeps you up to date on space news to a Smithsonian app that shows what you'd look like as a caveman, federal agencies have cooked up innovative mobile apps for iPhone, Android and BlackBerry users. Here are 14 of the most popular.
Air Force Brass Get Secure Smartphones
General Dynamics will provide 300 new devices to leaders of the military service branch, part of a broader move across the Department of Defense to make classified data more portable.
Wyoming Completes Google Apps Migration
Days prior to Microsoft's Office 365 launch, the first state government to drop its in-house software in favor of Google's cloud-computing offering announced that all 10,000 employees have made the move.
LulzSec Takes Hit, Keeps On Hacking
British authorities charge teenager with launching DDoS attack, and anti-LulzSec group says it's tracing identities of the hacking group's members.
EHRs Get Help Meeting 'Meaningful Use'
The National Institutes of Health has launched MedlinePlus Connect, enabling electronic health records to link patients directly to up-to-date medical information.
LulzSec, Anonymous: Feds Most Wanted
While the hacker groups have drawn attention with public boasts, federal investigators have set up shop in numerous social media sites, going undercover where necessary to root cyber criminals.
3 DNS Risk Reduction Strategies
Department of Homeland Security cybersecurity guidance identifies the three most common risks associated with the Internet's address infrastructure and provides methods for mitigating them.
Feds Run 5 Of Top 10 Supercomputers Worldwide
Japan's K Computer and China's Tianhe-1A took the top two spots, but four Department of Energy systems and one run by NASA made the top 10 of a biannual ranking of the top 500 high-performance-computing systems.
Making Star Trek Reality: NASA Wants Ideas
Defense Department and the space agency want sci-fi fans, scientists, and space junkies of all types to help brainstorm ways to to fly humans to the outer reaches of the solar system by 2111.
As Fed CIO Kundra Departs, Will Progress Stall?
An analysis of Kundra's tenure earns him good grades for transformation--but his peers have split feelings on whether progress lies ahead, or a lack of leadership continuity will mean a stall.
Federal CIO Kundra Resigns For Harvard Job
Vivek Kundra will leave the White House for the Ivy League after two years of pushing aggressively for federal IT reform on consolidation, cloud computing, and cybersecurity.
EHR Donation To Help Bridge Digital Divide
Quest, and its IT subsidiary MedPlus, are the first vendors to officially participate in a HHS effort to support e-health record adoption rates among healthcare providers in underserved, minority communities.
U.S. Grills China About Cyber Attacks
Chinese IP addresses have been implicated in numerous, recent distributed denial of service attacks, which top State Department officials see as a human rights issue.
How LulzSec Hackers Outsmart Security Gurus
While the world argues whether the hacktivist group is more Robin Hood or terrorist, the big question is: how have the hacks been so successful? Security experts share some answers.