Cybersecurity
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
-
After a phishing incident in December initially cost Warren County over $3.3 million, officials may soon pass a thorough computer use policy for county employees that will touch on related issues.
More Stories
-
With so many devices featuring hard drives, security vulnerabilities abound.
-
California could be the first state in the nation to include cyber-readiness in its emergency plan, which includes disasters that could endanger citizens and infrastructure.
-
Mayor Andre Pierre thought someone was stealing items in his office, as questions arise about procurement of the surveillance camera.
-
The Washtenaw County, Mich., Cyber Citizenship Coalition is a grass-roots effort that ensures residents use technology safely and securely.
-
More control over the power grid means more efficiency for consumers and the electric industry, but also more vulnerabilities.
-
Texas has spent more than $1.8 million to help mitigate the year-long data breach from the state’s Comptroller’s Office, according to a local newspaper.
-
Federal officials unveil the National Strategy for Trusted Identities in Cyberspace, an initiative to create a network that facilitates secure transactions.
-
U.S. Cyber Challenge works to develop cyber-security skills to meet the country’s work force needs.
-
Symantec report provides data on cyber-threat activity that occurred in 2010.
-
Government IT professionals should be concerned about the intrusion, particularly smaller municipalities that may not have the latest virus and malware protections.
-
Government Accountability Office says the IRS must remedy unencrypted networks, outdated software, faulty access control protocols.
-
Google digitizes Nelson Mandela, customer satisfaction survey.
-
CIOs grapple with the growing use of personal smartphones to access corporate networks.
-
A coalition of industry groups asserts that tax credits and other incentives — not mandates — would improve cyber-security of private-sector networks.
-
Security issues often arise after government computers’ end of life.
-
States must adopt better programs for wiping hard drives clean, experts say.
-
Napolitano’s 2012 budget request includes funds for key cyber-security initiatives.
-
Cloud security vendor’s report shows rise in mobile malware, changes in how public and private sectors go online.