Cybersecurity
-
The National Association of State Chief Information Officers’ list reflects pressure on states to manage cyber risk, modernize systems and implement AI responsibly — with federal partnership playing a central role.
-
Following an internal audit by the city technology office, leaders said they have removed an unknown account that had gained access to confidential legal files. An IT analysis is underway.
-
Attorney General Dana Nessel is renewing her call for Michigan to pass a law requiring companies to immediately report data breaches to her office, which would allow for quickly alerting the public.
More Stories
-
This webinar will share data from ISTR 22 to better understand the threats and trends that will affect us in 2017. It will cover key findings of the report and best practices to keep us protected in 2017.
-
This will be the first time the Air Force has opened its network to such broad scrutiny and comes in response to increased daily cyberthreats.
-
The new cameras are intended to overlook areas that see heavy resident and visitor traffic, including the bars that line the town's small central business district.
-
The school's Master of Public Administration program, together with the its Cyber Institute, is trying to better understand the workforce needs of the region’s nascent and sometimes nebulous cyberindustries.
-
The transit administration said releasing the footage would present unacceptable security risks by divulging where its cameras are located and how they pan and zoom.
-
The Symantec 2017 Internet Security Threat Report scrutinizes a variety of cyberthreats relevant to public agencies including security in the cloud, ransomware, and a rise in reliance on emails and commonly used IT tools.
-
And just as the legal cloud-computing giants aim to efficiently offer products of broad use to a wide customer base, criminal computing services do the same.
-
The organization, called MC² for short, announced that it will seek to chip away at the shortage through an apprenticeship program.
-
On day two of the 2017 midyear conference, attendees participated in interactive and informal sessions to exchange ideas and discuss best practices.
-
More than 530 government and industry attendees gathered to talk about top strategies, and management processes and solutions.
-
Roman Seleznev, the son of a member of the Russian parliament, hacked into thousands of business computers to steal the data.
-
Maryland has emerged as a leader in cybersecurity education as its schools moved to meet a growing demand for workers qualified for jobs in the state's burgeoning cybersecurity industry.
-
A bot named Mayhem was created by a Pittsburgh-based company to use artificial intelligence to detect and defend against attacks.
-
Since operational technology was built pre-Internet and is goal-oriented, its security is not always a top priority
-
Though routing personal data through a VPN’s server may hide it from the outside world, it also gives the VPN provider near unfettered access to personal and identifying information.
-
Should travelers refuse to hand over their devices or comply in any way, including if they don’t provide their passwords, agents could detain or seize the device.
-
This bill would protect Pennsylvanians by requiring that state employees use encryption when transmitting Social Security numbers, driver’s license numbers, financial information and other sensitive data.
-
Ohio Prison's Security Questioned After Two Inmates Built Computers, Went on Illegal 'Surfing' SpreeOne inmate stole the identity of a fellow prisoner to apply for five credit cards and also planned to file false tax returns and have the refunds wired to the credit cards.
Most Read