Cybersecurity
-
As artificial intelligence continues to evolve, how can public-sector teams prepare organizationally for the next generation of cyber attacks and equip themselves with the right tools?
-
As federal and state governments extend their lists of banned foreign technologies, where is this trend heading next? Is your home network safe for work use?
-
Chief Privacy Officer Martha Wewer reviewed the state’s approach to data protection, AI oversight and consumer privacy on Thursday as Gov. Josh Stein marked a new day of awareness during Data Privacy Week.
More Stories
-
The lab offers students cutting-edge computer technology to hone their skills in areas such as encryption, malware and cyber attacks.
-
Target's huge data breach brought into the limelight once again the neverending battle against thievery.
-
Security experts want to use a technical system to monitor mobile telephone calls, emails, and online messenger services and chats, and drones and positioning systems that can stop attacks from the sea.
-
In some instances, Obama clearly tried to strike a balance between protecting Americans from terrorism and addressing the concerns about privacy. But in other instances, he just didn’t decide.
-
Startup's technology turns the hackers' techniques against them.
-
Emergency managers are increasingly concerned about cyberattacks on 911 and other public safety systems.
-
Since 1952, the NSA has expanded almost nonstop. But until 2001, the agency still faced limits on what kind of information it could gather.
-
An outside analysis of the site by security experts identified several significant issues which leave it vulnerable to a breach.
-
There is no evidence that intelligence agencies abused power, according to Obama.
-
Wireless equipment installed on computer hardware enables covert surveillance even if a computer is kept offline.
-
After the nation’s largest state-agency security breach, the agency wants $3.5 million in 2014-15 to develop its new chief security information officer’s team, among other things.
-
A Department of Energy grant enlists Georgia Tech researchers in an effort to protect the nation's utility infrastructure.
-
We all know security in cyberspace is a critical topic, but the problem is that we simply do not understand it, which means we can be taken advantage of.
-
As more industrial devices connect to computer networks, IT security professionals learn they have more things to watch out for.
-
Twenty-five percent of respondents are planning to move their data outside the U.S., and security is the top concern of 96 percent of those surveyed.
-
As a result of these disclosures, terrorists and their support networks now have a better understanding of our collection methods, officials say.
-
The N.C. Department of Health and Human Services has blamed human error in computer programming and its quality assurance process for the mistake.
-
The first-come, first-served incentive targets companies less than five years old to bolster an emerging industry.