Report identifies fastest broadband speeds and most unique IP address for 201 countries worldwide.
Gov. Bev Perdue distributes North Carolina's first state government social media policy.
Of 1,400 CIOs surveyed, more than 40 percent say their IT departments are having trouble keeping up with the current workload.
The 2009 school year began with New York City's first 'dedicated parent inquiry system.'
Funding shortfalls and inconsistent data quality could challenge the implementation of a nationwide real-time traffic information system.
Attacks from the inside of an organization can be just as damaging as external attacks.
These city governments are using digital technologies to better serve their citizens and streamline operations.
In a recent webinar, Takai talked about transparency, underserved areas of the state and protecting information online.
The new authority will allow the Department of Homeland Security to staff up to 1,000 positions over the next three years.
A Miami man faces up to 25 years in prison for stealing over 40 million credit card numbers.
Hackers from around the world were surveyed at a recent IT security conference.
Senior cyber-security aide to the Obama administration resigns after years of service.
The use of Web 2.0 technologies and software as a service (SaaS) are proving to be functional and cost-effective strategies in local government offices.
With over 20 years experience in information technology, Jim Moody takes over as the Chief of the Infrastructure Division at Caltrans.
In hard times, cell phone and TV service cut before Internet.
Shell Culp discusses the benefits and challenges of telework in government agencies.
285 million records were compromised in 2008, which is more than the past four years combined.
"Twenty years ago no one would have imagined that hackers could use inexpensive, store-bought equipment to shut down governments in other nations."
European Union must protect against cyber attacks, 2012 Olympic Games demand better cyber-security and hacker arrested for P2P malware.
"The Web is the future and it's here. We just need to catch up to it."
"We may be down, but we are far from out," says U.S. Postmaster General John E. Potter.
New cases of 'swatting' are occurring more frequently, leaving law enforcement few leads.
Curious couriers help themselves to an early Christmas treat.
Speakers at the 2008 Best of California conference discuss the importance of innovative ideas in the tough times we face today.
The new Trojan horse has accounted for 60 percent of malicious spam in the last hour.
One man's experience of a near large-scale data breach.
"If you make it easy for people to steal from you, it is unfortunate, but people will."
With an ongoing struggle for the basics of survival, how can technology be considered a priority by and for the citizens of Cambodia?
Palin has made efforts to expand the use of technology in Alaska.
"With the cooperation of our law enforcement partners around the world, we can identify, charge and apprehend even the most sophisticated international computer hackers."
According to the study, most users assume that dynamic random access memory is erased when a computer is shut down.