Cybersecurity
-
As artificial intelligence continues to evolve, how can public-sector teams prepare organizationally for the next generation of cyber attacks and equip themselves with the right tools?
-
As federal and state governments extend their lists of banned foreign technologies, where is this trend heading next? Is your home network safe for work use?
-
Chief Privacy Officer Martha Wewer reviewed the state’s approach to data protection, AI oversight and consumer privacy on Thursday as Gov. Josh Stein marked a new day of awareness during Data Privacy Week.
More Stories
-
The latest Internet bug dates back to 2011, but its recent discovery has prompted one government agency to take citizen-facing services offline.
-
The former president said Snowden's leaked secrets about government surveillance should force leaders to consider how to balance the use of technology for national security without destroying liberty.
-
The technology, called the Laser Weapon System, will be the first of its kind to be deployed, according to the U.S. Navy.
-
Starting Tuesday, a large group of politicians will gather in Austin for the Civil Rights Summit at the LBJ Library -- how will the event be secured?
-
There are three main legislative proposals to end the bulk phone records collection program -- here's a rundown of each.
-
Move gives technology lobbying group a fresh boost of federal legislative expertise.
-
A billing company that does business with Los Angeles County hospitals and clinics revealed a security breach in February may have compromised the personal data of twice as many people as initially thought.
-
Stealthier malware and increasingly larger-scale cyberattacks give rise to unsettling possibilities about the world’s digital future.
-
Trustwave Holdings gave Target Corp. the green light on payment card security last September, just weeks before malware installed on the retailer’s networks began sucking up customer information in a mega data heist.
-
At the Tuscarora School District in Mercersburg, Pa., CIO Aaron Trusky will use the same techniques as a malicious hacker, but in a lawful and legitimate way in order to assess system security.
-
After the nation’s worst breach at a state agency, the budget board offers all departments cybersecurity measures.
-
The attack is an alleged retaliation for the March 16 shooting of James M. Boyd.
-
Personal information of more than 290,000 former and current North Dakota University students, staff and faculty was left vulnerable, according to an official.
-
A report from the Transportation Security Administration outlines 14 recommendations for airports across the U.S. after the deadly shooting in 2013 at Los Angeles International.
-
Unless a computer is turned off and unplugged from the Internet, it is at risk of cyber attack -- and even that may not be safe.
-
Privacy versus the Sunshine Act, which outlines criteria for transparent meetings.
-
The potentially problematic transactions were believed to have been made between Aug. 2, 2013, and Jan. 31 of this year.
-
Communication between the data center and a Gmail client is encrypted, but still available with a warrant from the source