Cybersecurity
-
Lawmakers in the Magnolia State are considering bills to make the state CIO a cabinet member, mirroring a national trend of CIOs evolving from tech managers to enterprise leaders — and to create a cybersecurity department.
-
School and college administrators are among hundreds of attendees at this week's TEEX Cyber Readiness Summit, exploring a wide range of topics from AI and security to identity theft and human firewalls.
-
As artificial intelligence continues to evolve, how can public-sector teams prepare organizationally for the next generation of cyber attacks and equip themselves with the right tools?
More Stories
-
The attack is an alleged retaliation for the March 16 shooting of James M. Boyd.
-
Personal information of more than 290,000 former and current North Dakota University students, staff and faculty was left vulnerable, according to an official.
-
A report from the Transportation Security Administration outlines 14 recommendations for airports across the U.S. after the deadly shooting in 2013 at Los Angeles International.
-
Unless a computer is turned off and unplugged from the Internet, it is at risk of cyber attack -- and even that may not be safe.
-
Privacy versus the Sunshine Act, which outlines criteria for transparent meetings.
-
The potentially problematic transactions were believed to have been made between Aug. 2, 2013, and Jan. 31 of this year.
-
Communication between the data center and a Gmail client is encrypted, but still available with a warrant from the source
-
A fake barrel cactus with a camera mounted inside and an unmanned robot to explore underground drug tunnels among the tech on display.
-
Professors suggest relaxing security instead of increasing it.
-
Vital to U.S. strategic success in cybersecurity is the high-dollar investment in radar-jamming technology and other electronic warfare.
-
Every day, hackers ranging from high school kids to Iranian Revolutionary Guards search for ways to control or disrupt the flow of power in the United States or steal consumer information.
-
The need for information security specialists will only increase as breaches and cybersecurity issues become more dangerous and mainstream.
-
When a targeted individual tried to access certain websites, such as a Facebook page, the report said an alarm would prompt the NSA program to send "malicious data packets" that appear as if they are coming from a legitimate page.
-
For local governments tasked with protecting taxpayers at the ground level, a good privacy policy and good security policy go hand-in-hand.
-
Experts recommend building some flexibility into your security policy, and keeping it updated.
-
The ever-changing digital landscape requires IT professionals to be vigilant about keeping their cybersecurity programs up-to-date.
-
During his talk, Snowden discussed the importance of end-to-end encryption, reining in government surveillance, congressional powers and how tech companies must regain consumer trust when it comes to the storage of personal information.
-
Cybersecurity is no longer a niche subject for IT aficionados; it is a government problem, in addition to a mainstream, societal problem.
Most Read