Cybersecurity
-
As artificial intelligence continues to evolve, how can public-sector teams prepare organizationally for the next generation of cyber attacks and equip themselves with the right tools?
-
As federal and state governments extend their lists of banned foreign technologies, where is this trend heading next? Is your home network safe for work use?
-
Chief Privacy Officer Martha Wewer reviewed the state’s approach to data protection, AI oversight and consumer privacy on Thursday as Gov. Josh Stein marked a new day of awareness during Data Privacy Week.
More Stories
-
At the Black Hat 2014 conference, Billy Rios of Qualys Security revealed details about several vulnerabilities he was able to find, most notably in the airport device entrusted to detect trace levels of drugs and explosives.
-
There should be more accountability — and less legal leeway — for the software vendors and their technology's source code.
-
Critics have faulted many companies for being slow to address their cyber vulnerabilities.
-
As cyber-criminals become more sophisticated, Anthony Roman, president of risk-management firm Roman and Associates, says they are capable of hitting elements that keep society’s autonomy and infrastructure functioning.
-
Privacy and civil-liberties advocates say Seattle needs to enact a strong review process to guide how information is collected, stored, shared and protected, rather than leaving the guidelines to various departments.
-
A California bill that would require smartphone makers to include functionality to remotely disable their devices in the event of theft is alive again in the capitol.
-
A federal measure charges the U.S. Department of Homeland Security with developing a comprehensive preparation and response plan to address cyber-threats.
-
Assistant Attorney General for National Security John P. Carlin said investigators don't just need to know how cyber criminals breached a system, but also figure out what businesses are doing to attract threats.
-
Two senators introduce a federal bill designed to protect student education records with an update to existing FERPA legislation.
-
Overcoming a problem with improper payments of jobless benefits saved New Jersey hundreds of millions. One of its strategies could end up helping other states.
-
The National Institute of Standards and Technology has identified 65 forensic science challenges in the cloud, and is working to build a roadmap to overcoming them.
-
The council is considering bids from two companies to protect internal communications; the chosen company would develop a computer server separate from the executive and other offices.
-
Driving the trend is the black market. Whereas thieves might pay a buck for a stolen credit card number, a full-identity profile from a medical record can fetch up to $500, experts say.
-
Justices cited the growing intersection of privacy and technology, and seemed to recognize citizens' growing dependence on cellphones and their general expectation of privacy in using them.
-
Utility companies are spending millions annually in cyber security costs, and the trend will continue with investments in smart meters and other technology meant to bring the electric grid up to date.
-
A fixture in Michigan state government for the past 17 years, Lohrmann has been a leading voice on cybersecurity in the public sector.
-
Online hacking cases are tough for investigators because criminals can easily cover their tracks, legal experts agree. Even when the trail leads to a single computer, it can be hard to prove who was at the keyboard.
-
Ron Baldwin talks about securing employees' mobile devices in the workplace.