Cybersecurity
-
Following an internal audit by the city technology office, leaders said they have removed an unknown account that had gained access to confidential legal files. An IT analysis is underway.
-
Attorney General Dana Nessel is renewing her call for Michigan to pass a law requiring companies to immediately report data breaches to her office, which would allow for quickly alerting the public.
-
Government security leaders are struggling. Cyber investments are lagging. Resources are being cut. The problem is getting worse. Let’s explore solutions.
More Stories
-
This will be the first time the Air Force has opened its network to such broad scrutiny and comes in response to increased daily cyberthreats.
-
The new cameras are intended to overlook areas that see heavy resident and visitor traffic, including the bars that line the town's small central business district.
-
The school's Master of Public Administration program, together with the its Cyber Institute, is trying to better understand the workforce needs of the region’s nascent and sometimes nebulous cyberindustries.
-
The transit administration said releasing the footage would present unacceptable security risks by divulging where its cameras are located and how they pan and zoom.
-
The Symantec 2017 Internet Security Threat Report scrutinizes a variety of cyberthreats relevant to public agencies including security in the cloud, ransomware, and a rise in reliance on emails and commonly used IT tools.
-
And just as the legal cloud-computing giants aim to efficiently offer products of broad use to a wide customer base, criminal computing services do the same.
-
The organization, called MC² for short, announced that it will seek to chip away at the shortage through an apprenticeship program.
-
On day two of the 2017 midyear conference, attendees participated in interactive and informal sessions to exchange ideas and discuss best practices.
-
More than 530 government and industry attendees gathered to talk about top strategies, and management processes and solutions.
-
Roman Seleznev, the son of a member of the Russian parliament, hacked into thousands of business computers to steal the data.
-
Maryland has emerged as a leader in cybersecurity education as its schools moved to meet a growing demand for workers qualified for jobs in the state's burgeoning cybersecurity industry.
-
A bot named Mayhem was created by a Pittsburgh-based company to use artificial intelligence to detect and defend against attacks.
-
Since operational technology was built pre-Internet and is goal-oriented, its security is not always a top priority
-
Though routing personal data through a VPN’s server may hide it from the outside world, it also gives the VPN provider near unfettered access to personal and identifying information.
-
Should travelers refuse to hand over their devices or comply in any way, including if they don’t provide their passwords, agents could detain or seize the device.
-
This bill would protect Pennsylvanians by requiring that state employees use encryption when transmitting Social Security numbers, driver’s license numbers, financial information and other sensitive data.
-
Ohio Prison's Security Questioned After Two Inmates Built Computers, Went on Illegal 'Surfing' SpreeOne inmate stole the identity of a fellow prisoner to apply for five credit cards and also planned to file false tax returns and have the refunds wired to the credit cards.
-
CISO Jeanette Hanna-Ruiz's fear is a direct cyberattack on a satellite, perhaps even allowing adversaries to commandeer the controls.