Cybersecurity
-
Lawmakers in the Magnolia State are considering bills to make the state CIO a cabinet member, mirroring a national trend of CIOs evolving from tech managers to enterprise leaders — and to create a cybersecurity department.
-
School and college administrators are among hundreds of attendees at this week's TEEX Cyber Readiness Summit, exploring a wide range of topics from AI and security to identity theft and human firewalls.
-
As artificial intelligence continues to evolve, how can public-sector teams prepare organizationally for the next generation of cyber attacks and equip themselves with the right tools?
More Stories
-
Leaks represent the “most damaging theft of intelligence information in our history," according to James Clapper, the director of national intelligence.
-
In honor of Data Privacy Day, the event organizer offers the public five tips to protect cellphones from hacking.
-
In the latest leak, the NSA can secretly collect an individual’s location, age, sex and other personal data from smartphone applications, including such popular apps as the game Angry Birds.
-
Guard units in every state have made great strides in protecting their own computer infrastructure, and governors say the Guard is well-equipped to meet broader state demands for cybersecurity.
-
Tim Pawlenty calls for more "cooperative plans and action steps in areas such as information sharing, defensive tactics, system improvements, crisis response and management, as well as the need for more joint efforts with government."
-
For those who sign up for care, he says there's nothing consumers can do to protect themselves.
-
In an interview on German TV, Edward Snowden reveals that the NSA is involved in industrial espionage.
-
The lab offers students cutting-edge computer technology to hone their skills in areas such as encryption, malware and cyber attacks.
-
Target's huge data breach brought into the limelight once again the neverending battle against thievery.
-
Security experts want to use a technical system to monitor mobile telephone calls, emails, and online messenger services and chats, and drones and positioning systems that can stop attacks from the sea.
-
In some instances, Obama clearly tried to strike a balance between protecting Americans from terrorism and addressing the concerns about privacy. But in other instances, he just didn’t decide.
-
Startup's technology turns the hackers' techniques against them.
-
Emergency managers are increasingly concerned about cyberattacks on 911 and other public safety systems.
-
Since 1952, the NSA has expanded almost nonstop. But until 2001, the agency still faced limits on what kind of information it could gather.
-
An outside analysis of the site by security experts identified several significant issues which leave it vulnerable to a breach.
-
There is no evidence that intelligence agencies abused power, according to Obama.
-
Wireless equipment installed on computer hardware enables covert surveillance even if a computer is kept offline.
-
After the nation’s largest state-agency security breach, the agency wants $3.5 million in 2014-15 to develop its new chief security information officer’s team, among other things.
Most Read