Cybersecurity
-
As artificial intelligence continues to evolve, how can public-sector teams prepare organizationally for the next generation of cyber attacks and equip themselves with the right tools?
-
As federal and state governments extend their lists of banned foreign technologies, where is this trend heading next? Is your home network safe for work use?
-
Chief Privacy Officer Martha Wewer reviewed the state’s approach to data protection, AI oversight and consumer privacy on Thursday as Gov. Josh Stein marked a new day of awareness during Data Privacy Week.
More Stories
-
Solutions to deal with security and data privacy issues have sprouted up in droves, but is there a good fix to the people problem?
-
As the company moves aggressively to position itself as a protector of student-data privacy, some say it runs the risk of a backlash if it doesn't back up its talk with the kind of vigilance the technology giant promises to deliver.
-
The state opened a 30-day window to collect public comment about the idea of using drones to improve prison security, after which officials will decide whether to start testing at two Warren County prisons.
-
Although the bill's purpose is to ease communication between businesses and federal authorities, proponents of computer security say the use of vague language and broad concepts raise serious privacy concerns.
-
Biometric technologies identify an individual based on unique physical and behavioral traits, reducing the risk of identity fraud and eliminating the need for password memorization.
-
Between 2006 and 2013, some 22.8 million records of New Yorkers were exposed because of hacking attacks, accidental security lapses and insider wrongdoing.
-
The nearly century-old air base outside Mascoutah, Ill. is poised to benefit enormously from its rapidly growing role as a central hub for Pentagon cybersecurity operations.
-
The Unlocking Consumer Choice and Wireless Competition Act would allow consumers to transfer cellphones themselves more easily when changing providers.
-
Experts at an Austin security conference encouraged businesses — large and small — to use newly issued guidelines to protect themselves and their customers.
-
According to an analysis by the Ponemon Institute, only 28 percent of survey respondents said security was one of the top five strategic priorities at their organizations.
-
Wickr, the Guardian Project and Tor exemplify the digital paranoia that's taking shape in the U.S.
-
A program of the Department of Homeland Security Science and Technology Directorate, SWAMP offers software developers a mix of open-source and commercial software analysis tools.
-
Those who entrust their private information to a corporation or government agency need protections similar to those who have invested financially.
-
It is crucial in today’s security climate to begin classifying data and networks in a new way, based not just on levels of sensitivity but on shelf life and the realities of our evolving computing landscape.
-
Foreign concern about NSA spying is affecting the cloud market, and Microsoft is fighting back.
-
The Target data breach in 2013 spurred Kentucky lawmakers to put notification policies in place so that citizens receive timely notice when credit card and other sensitive data is stolen.
-
As data breaches draw international attention, shoppers are looking for accountability, according to a National Consumers League survey released Monday.
-
As more and more people travel and global trade expands, it's clear that effective identity management is becoming a critical issue for governments worldwide.