Cybersecurity
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
-
After a phishing incident in December initially cost Warren County over $3.3 million, officials may soon pass a thorough computer use policy for county employees that will touch on related issues.
More Stories
-
In the past month, the photo identification technology associated with the new, more secure drivers’ licenses and identification cards has caused a string of system crashes.
-
Many challenges remain to establishing digital identities, but state and local governments must act quickly.
-
The Colorado Governor’s Office of Information Technology says cyber-security flaws will be swiftly addressed.
-
-
Seventy-one percent of supply chain organizations want feds to be more active in cyber-defense.
-
A look at the trends and people that influenced government IT in 2010.
-
Unisys contract with Minneapolis will bring upgraded cyber-security solution and save $2.2 million.
-
Will Pelgrin, president and CEO of the Center for Internet Security, says a new 24/7 operations center led by the nonprofit Multi-State Information Sharing and Analysis Center will improve information sharing and monitoring of cyber-security threats.
-
Smartphone vulnerabilities, malware-as-a-service and more sophisticated Trojans will become bigger threats in 2011, cyber-security vendor predicts.
-
Airport security expert says full-body scanners are a misguided safety measure.
-
Adjusted forecast says smart grid cyber-security spending to total $6.5 billion through 2015.
-
After-action report of the Cyber Storm III national cyber-security exercise is due in 2011.
-
Common assumptions about space and time may have to be abandoned to effectively fight a cyber-war, Air Force document finds.
-
Researchers find that ‘advanced evasion techniques’ are a new class of cyber-threat that can break through most intrusion prevention systems.
-
Cloud computing and health-care IT are higher priorities as identified by state CIOs in 2011.
-
Combating botnets often inadequate in the public sector, vendor says.
-
Learning about an organization from the inside out.