Cybersecurity
-
Bryce Bailey, deputy state CISO, has been tapped to be interim CISO in the Cornhusker State following the departure of Abby Eccher-Young. The state is also looking to hire a new chief data officer.
-
Tulsa International Airport recently suffered a ransomware attack, a spokeswoman confirmed. The facility is independent of the city of Tulsa, which suffered its own such incident in early 2019.
-
City officials are trying to determine the full extent of systems impacted by a ransomware attack, which paralyzed phone and computer systems in multiple departments beginning early Wednesday.
More Stories
-
Utility companies are spending millions annually in cyber security costs, and the trend will continue with investments in smart meters and other technology meant to bring the electric grid up to date.
-
A fixture in Michigan state government for the past 17 years, Lohrmann has been a leading voice on cybersecurity in the public sector.
-
Online hacking cases are tough for investigators because criminals can easily cover their tracks, legal experts agree. Even when the trail leads to a single computer, it can be hard to prove who was at the keyboard.
-
Ron Baldwin talks about securing employees' mobile devices in the workplace.
-
Solutions to deal with security and data privacy issues have sprouted up in droves, but is there a good fix to the people problem?
-
As the company moves aggressively to position itself as a protector of student-data privacy, some say it runs the risk of a backlash if it doesn't back up its talk with the kind of vigilance the technology giant promises to deliver.
-
The state opened a 30-day window to collect public comment about the idea of using drones to improve prison security, after which officials will decide whether to start testing at two Warren County prisons.
-
Although the bill's purpose is to ease communication between businesses and federal authorities, proponents of computer security say the use of vague language and broad concepts raise serious privacy concerns.
-
Biometric technologies identify an individual based on unique physical and behavioral traits, reducing the risk of identity fraud and eliminating the need for password memorization.
-
Between 2006 and 2013, some 22.8 million records of New Yorkers were exposed because of hacking attacks, accidental security lapses and insider wrongdoing.
-
The nearly century-old air base outside Mascoutah, Ill. is poised to benefit enormously from its rapidly growing role as a central hub for Pentagon cybersecurity operations.
-
The Unlocking Consumer Choice and Wireless Competition Act would allow consumers to transfer cellphones themselves more easily when changing providers.
-
Experts at an Austin security conference encouraged businesses — large and small — to use newly issued guidelines to protect themselves and their customers.
-
According to an analysis by the Ponemon Institute, only 28 percent of survey respondents said security was one of the top five strategic priorities at their organizations.
-
Wickr, the Guardian Project and Tor exemplify the digital paranoia that's taking shape in the U.S.
-
A program of the Department of Homeland Security Science and Technology Directorate, SWAMP offers software developers a mix of open-source and commercial software analysis tools.
-
Those who entrust their private information to a corporation or government agency need protections similar to those who have invested financially.
-
It is crucial in today’s security climate to begin classifying data and networks in a new way, based not just on levels of sensitivity but on shelf life and the realities of our evolving computing landscape.
Most Read
- Tyler Acquires Court Tech Firm For the Record for $212.5M
- Options: A More Balanced Conversation About Kids, Screens and Schools
- Minnesota School District Pilots AI, Cameras for Teacher Evaluation
- NASCIO Releases Digital Accessibility Guidance for Governments
- How the IT Team Helped One Government Weather the Storm