Cybersecurity
-
Lawmakers in the Magnolia State are considering bills to make the state CIO a cabinet member, mirroring a national trend of CIOs evolving from tech managers to enterprise leaders — and to create a cybersecurity department.
-
School and college administrators are among hundreds of attendees at this week's TEEX Cyber Readiness Summit, exploring a wide range of topics from AI and security to identity theft and human firewalls.
-
As artificial intelligence continues to evolve, how can public-sector teams prepare organizationally for the next generation of cyber attacks and equip themselves with the right tools?
More Stories
-
The United States spends more than $50 billion a year on spying and intelligence, while the folks who built OpenSSL are four core programmers, only one of whom calls it a full-time job.
-
When the owner of a small tech firm shared the how easy it was to tap into power companies' computer networks, Homeland Security began sending alerts to power grid operators, advising them to upgrade their software.
-
Don’t put technology first, an expert warns; get the right people, and make sure they're trained and skilled in knowing what to look for.
-
Malloy said the 40 million cyber attacks on state government computers include attempts to steal basic agency information and obtain email lists.
-
Staff at UW-Madison’s Division of Information Technology were busy exposing, tracking and marking potential vulnerability, and that effort has just begun.
-
The information included Social Security numbers, medical or psychiatric histories of clients, and in one case an employee’s tax return forms.
-
When it comes to testing whether sites have been affected, two primary resources exist.
-
The latest Internet bug dates back to 2011, but its recent discovery has prompted one government agency to take citizen-facing services offline.
-
The former president said Snowden's leaked secrets about government surveillance should force leaders to consider how to balance the use of technology for national security without destroying liberty.
-
The technology, called the Laser Weapon System, will be the first of its kind to be deployed, according to the U.S. Navy.
-
Starting Tuesday, a large group of politicians will gather in Austin for the Civil Rights Summit at the LBJ Library -- how will the event be secured?
-
There are three main legislative proposals to end the bulk phone records collection program -- here's a rundown of each.
-
Move gives technology lobbying group a fresh boost of federal legislative expertise.
-
A billing company that does business with Los Angeles County hospitals and clinics revealed a security breach in February may have compromised the personal data of twice as many people as initially thought.
-
Stealthier malware and increasingly larger-scale cyberattacks give rise to unsettling possibilities about the world’s digital future.
-
Trustwave Holdings gave Target Corp. the green light on payment card security last September, just weeks before malware installed on the retailer’s networks began sucking up customer information in a mega data heist.
-
At the Tuscarora School District in Mercersburg, Pa., CIO Aaron Trusky will use the same techniques as a malicious hacker, but in a lawful and legitimate way in order to assess system security.
-
After the nation’s worst breach at a state agency, the budget board offers all departments cybersecurity measures.
Most Read