Cybersecurity
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
-
After a phishing incident in December initially cost Warren County over $3.3 million, officials may soon pass a thorough computer use policy for county employees that will touch on related issues.
More Stories
-
President Bush says a dose of IT can help the ailing health-care industry save billions of dollars, but government's role in the transformation is unclear.
-
Government and education make forays into consolidating information systems.
-
Criminal files no longer eat up reams of paper in this Alabama city's homicide unit.
-
-
Provides insight into the countries with the greatest number of computers pressed into service for illegal activity
-
The digital revolution raises difficult new questions about how to maintain a complete account of government activities
-
"Democracy abhors undue secrecy. . . . [A]n unlimited government warrant to conceal, effectively a form of secrecy per se, has no place in our open society"
-
"We can maintain secure compliance with far fewer resources"
-
Congress should enact a uniform national breach notification law for unauthorized access to unencrypted personal information and stressed the importance of including "safe harbor" provisions for companies that encrypt sensitive information.
-
Cybersecurity challenges faced by the Department of Homeland Security
-
The city and county are both replacing their punch card voting technology with new systems that will comply with the Help America Vote Act
-
Passwords, many of them Social Security Numbers, downloaded
-
-
Workshop seeks to arm teens who view Internet as a social enabler with the tools to stay safe.
-
"This year we plan to focus our efforts on establishing baseline security assurance levels and cyber recommendations to increase industry security"
-
To stand a chance at receiving the funds for the project, the grant had to include security guidelines
-
Gartner's managing vice president says that while new technologies will continually redefine appropriate security frameworks, complying with policy should not distract from securing systems and the data housed in them.
-
Lawyer with cybercrime and security policy experience named to lead the staff