Revealed: Our picks for the best password strategies
Our readers offer hundreds -- literally -- of good ideas for building and managing strong passwords. Who's idea comes closest to covering all the bases?
Your Web browser's fingerprints can betray you, study finds
The Electronic Frontier Foundation studies the configurations of nearly a half-million browsers and found that the vast majority of them could be uniquely identified, which means they could be tracked without using cookies.
Think you want an iPad? Read this first!
Everyone seems to want an iPad, but is it worth it? Early reviews paint a muddled picture of iPad's pros and cons.
The handicapper's guide to the FOSE conference
One person can't take in all of what the FOSE conference offers, so here's one suggested route to getting a good overview of what's happening in government information technology.
With social media, should DOD go to the people, or should the people go to DOD?
Paul A. Strassman's recent column—arguing that DOD's social media policy doesn't do enough to address security—sparked a lively debate among readers, many of whom question whether DOD, or government in general, is suited to hosting social media sites.
Will telework gain traction after record snowfalls?
The heavy snows of the past week should put a greater commitment to telework on the government’s front burner, to judge from the comments posted to our coverage. But many seem to fear that entrenched opposition will cause any push toward telework to fade as quickly as the snow.
New evidence in Google attack points East
A security researcher for SecureWorks says he has found evidence to support Google's claim that last month's attacks on the company’s systems originated in China, while another security expert called the attacks the largest and most sophisticated in years aimed at businesses.
In wake of TSA breach, a refresher on redacting PDFs
The exposure of the Transportation Security Administration's operations manual will likely prompt agnecies to review the National Security Agency's guidance on how to safely redact information from documents posted to the Web.
Readers offer stuffing for IT turkey
Readers suggest a few projects that could have made our Thanksgiving list of failed, or deeply troubled, government IT projects and debate the causes of such large-scale failures.
IT turkeys: 7 government projects worthy of a roast
Over the years, the American public has been gifted with its share of computer-based turkeys -- information technology projects gone wrong, often at spectacular expense.
EPA sets plans for emergency services buys
The agency is looking for input from vendors on creating a speedier procurement mechanism.
Washington Technology wins coverage award
Washington Technology won a gold medal today at the 50th Annual Jesse H. Neal National Business Journalism Awards in New York for its coverage last year on the use of dubious academic degrees among federal employees.
GAO tracks rise in IT spending
Federal spending on IT services nearly doubled from 1997 through 2001, with the most significant increase coming through General Services Administration contracts, according to a report from the General Accounting Office.
NIST recommends dual biometrics for visas
The National Institute of Standards and Technology is recommending a dual biometric system of fingerprint and facial recognition, possibly stored on smart cards, to identify visa holders at the nation's borders.
Almost There!
Help us tailor content specifically for you: