Cybersecurity
-
Lawmakers in the Magnolia State are considering bills to make the state CIO a cabinet member, mirroring a national trend of CIOs evolving from tech managers to enterprise leaders — and to create a cybersecurity department.
-
School and college administrators are among hundreds of attendees at this week's TEEX Cyber Readiness Summit, exploring a wide range of topics from AI and security to identity theft and human firewalls.
-
As artificial intelligence continues to evolve, how can public-sector teams prepare organizationally for the next generation of cyber attacks and equip themselves with the right tools?
More Stories
-
The digital revolution raises difficult new questions about how to maintain a complete account of government activities
-
"Democracy abhors undue secrecy. . . . [A]n unlimited government warrant to conceal, effectively a form of secrecy per se, has no place in our open society"
-
"We can maintain secure compliance with far fewer resources"
-
Congress should enact a uniform national breach notification law for unauthorized access to unencrypted personal information and stressed the importance of including "safe harbor" provisions for companies that encrypt sensitive information.
-
Cybersecurity challenges faced by the Department of Homeland Security
-
The city and county are both replacing their punch card voting technology with new systems that will comply with the Help America Vote Act
-
Passwords, many of them Social Security Numbers, downloaded
-
-
Workshop seeks to arm teens who view Internet as a social enabler with the tools to stay safe.
-
"This year we plan to focus our efforts on establishing baseline security assurance levels and cyber recommendations to increase industry security"
-
To stand a chance at receiving the funds for the project, the grant had to include security guidelines
-
Gartner's managing vice president says that while new technologies will continually redefine appropriate security frameworks, complying with policy should not distract from securing systems and the data housed in them.
-
Lawyer with cybercrime and security policy experience named to lead the staff
-
Event organizers expect more than 300 information technology professionals, business leaders and e-commerce executives to attend
-
"We want to remind people that Internet safety is an issue year-round and that precautionary measures must be taken before students truly become cyber savvy"
-
Experts warn desktop voice over IP services pose a threat to enterprises similar to the danger posed by unfettered and insecure instant messaging before organizations adopted policies addressing the practice and securing legitimate means for using the technology
-
"We were running out of space for storing paper-based books for various researchers." -- Cass County Clerk Jannis Mitchell
-
Two thirds of computers hard drives examined still contained data easily retrievable using readily available data recovery software
Most Read