Cybersecurity
-
Bryce Bailey, deputy state CISO, has been tapped to be interim CISO in the Cornhusker State following the departure of Abby Eccher-Young. The state is also looking to hire a new chief data officer.
-
Tulsa International Airport recently suffered a ransomware attack, a spokeswoman confirmed. The facility is independent of the city of Tulsa, which suffered its own such incident in early 2019.
-
City officials are trying to determine the full extent of systems impacted by a ransomware attack, which paralyzed phone and computer systems in multiple departments beginning early Wednesday.
More Stories
-
Smartphone vulnerabilities, malware-as-a-service and more sophisticated Trojans will become bigger threats in 2011, cyber-security vendor predicts.
-
Airport security expert says full-body scanners are a misguided safety measure.
-
Adjusted forecast says smart grid cyber-security spending to total $6.5 billion through 2015.
-
After-action report of the Cyber Storm III national cyber-security exercise is due in 2011.
-
Common assumptions about space and time may have to be abandoned to effectively fight a cyber-war, Air Force document finds.
-
Researchers find that ‘advanced evasion techniques’ are a new class of cyber-threat that can break through most intrusion prevention systems.
-
Cloud computing and health-care IT are higher priorities as identified by state CIOs in 2011.
-
Combating botnets often inadequate in the public sector, vendor says.
-
Learning about an organization from the inside out.
-
Whether it’s coaching a baseball team or managing information security, it all comes down to the fundamentals.
-
Only one-third of companies consider themselves extremely prepared for cyber-attacks, while two-thirds are supportive of government critical infrastructure protection programs.
-
Federal agencies request more guidance on roles and benchmarks.
-
Based on responses from 49 states, a new Deloitte-NASCIO report identifies the lack of funds, programs and resources as weak spots in public-sector cyber-security efforts.
-
Web applications are prolonged, persistent enterprise targets, not only because they are corruptible, but also because people are downloading corrupted Web apps at work.
-
Changes may come for those allowed to research and access data sets in the U.S. Department of Homeland Security’s cyber-defense.
-
Proposed legislation would give the president the power to declare a national cyber-emergency when a huge network attack occurs.
-
Vendor researcher includes USB drives, smartphones as top security risks.
Most Read
- Tyler Acquires Court Tech Firm For the Record for $212.5M
- Options: A More Balanced Conversation About Kids, Screens and Schools
- Minnesota School District Pilots AI, Cameras for Teacher Evaluation
- NASCIO Releases Digital Accessibility Guidance for Governments
- How the IT Team Helped One Government Weather the Storm