Cybersecurity
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
-
After a phishing incident in December initially cost Warren County over $3.3 million, officials may soon pass a thorough computer use policy for county employees that will touch on related issues.
More Stories
-
"We won't be able to attract these people with money. Security, pensions -- that will be part of it. But the other piece is going to be how they work and how they want to work"
-
Most importantly, educate people, since they are the weakest security link
-
-
Requires wireless providers to obtain a customer's express consent before including his or her name and phone number in any wireless directory or directory database
-
Bill would require government officials to take a course on open records and open meetings laws
-
"New York State must move towards a standardized Identity and Access Management (IAM) process where one credential issued to a user can be trusted across systems and government entities"
-
The way an agency handles customer information is also how it handles personal information belonging to agency staff.
-
Seeks public comment on certain definitions and substantive provisions under the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM)
-
The conference will bring together leading experts on VoIP deployment and security to address the technology, research, regulatory and public policy issues presented by voice over Internet protocol
-
"To be truly effective in preventing and combating security threats, organizations need to take further steps by spreading security awareness and knowledge from a select group of IT staff to larger portions of their employee base"
-
Prohibits state and local governments from issuing identification documents, driver's licenses, and ID cards containing RFID tags
-
"Single sign-on experience between the Solaris-based Operating System, Sun Java Enterprise System and Microsoft Windows Server has been customers' top request"
-
The stolen computer started sending covert alerts to a monitoring center providing the location where it was being used, which was then provided to law enforcement
-
Key recommendations include improved collaboration between law enforcement agencies investigating cybercrime and making security a priority in organizations
-
Provides information regarding IT security for work, home, government and business
-
"Workers' e-mail, IM, blog and Internet content creates written business records that are the electronic equivalent of DNA evidence."
-
Over 900,000 customers of a British Internet service provider were blacklisted earlier this month by the Spam Prevention Early Warning System, because those customers' PCs had been unwittingly hijacked and turned into spam zombies.
-
GAO urges IT staff to inventory existing IPv6-compatible equipment and developing a strategic plan for implementing IPv6; while NIST report outlines security issues with the implementation of voice-over IP networks