Cybersecurity
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
-
After a phishing incident in December initially cost Warren County over $3.3 million, officials may soon pass a thorough computer use policy for county employees that will touch on related issues.
More Stories
-
Whether it’s coaching a baseball team or managing information security, it all comes down to the fundamentals.
-
Only one-third of companies consider themselves extremely prepared for cyber-attacks, while two-thirds are supportive of government critical infrastructure protection programs.
-
Federal agencies request more guidance on roles and benchmarks.
-
Based on responses from 49 states, a new Deloitte-NASCIO report identifies the lack of funds, programs and resources as weak spots in public-sector cyber-security efforts.
-
Web applications are prolonged, persistent enterprise targets, not only because they are corruptible, but also because people are downloading corrupted Web apps at work.
-
Changes may come for those allowed to research and access data sets in the U.S. Department of Homeland Security’s cyber-defense.
-
Proposed legislation would give the president the power to declare a national cyber-emergency when a huge network attack occurs.
-
Vendor researcher includes USB drives, smartphones as top security risks.
-
Cell phones are undoubtedly cheaper, but public safety officials need their own dedicated networks for reasons like priority access and reliability. But the fourth-generation public safety network backed by the FCC could bring cost efficiencies for both consumers and first responders.
-
In the wake of Virginia’s IT troubles, Michigan Chief Technology Officer Dan Lohrmann suggests five things to ponder before technology fails.
-
Spanning earthquakes to water meters, Beverly Hills has rolled out an interactive and interoperable web based GIS portal for emergencyoperations and public information.
-
Public safety officials dealing with Motorola can expect to be pitched on the Motorola Next Generation of Public Safety Communications strategy.
-
"Using and participating in these online services and communities forces enterprises to relinquish a level of control that they historically would not tolerate."
-
Every government security policy must address all legal requirements and public concerns.
-
Forget laptops and PCs: The next big targets for cyber-criminals could be smartphones.
-
Terry Childs locked San Francisco out of its FiberWAN network for 12 days in 2008.
-
Supply chains are heavily dependent on IT, yet are difficult to secure because they often involve multiple networks working together.
-
One of the reasons that companies have been slow to comply with the new requirements is that there are typically many stakeholders involved in setting retention policies.