Cybersecurity
-
Lawmakers in the Magnolia State are considering bills to make the state CIO a cabinet member, mirroring a national trend of CIOs evolving from tech managers to enterprise leaders — and to create a cybersecurity department.
-
School and college administrators are among hundreds of attendees at this week's TEEX Cyber Readiness Summit, exploring a wide range of topics from AI and security to identity theft and human firewalls.
-
As artificial intelligence continues to evolve, how can public-sector teams prepare organizationally for the next generation of cyber attacks and equip themselves with the right tools?
More Stories
-
Only one in five chief financial officers (CFOs) are "highly satisfied" with their security programs
-
"I plan to continue to play a significant role in the major IT initiatives across the commonwealth including enterprise architecture, shared services, operation secure enterprise, statewide radio and key agency projects." -- Arthur C. Stephens
-
New systems will have to meet the standard in January 2006 while federal agencies will have a year to upgrade existing systems to be comply with the new standard
-
Requires public hearing prior to voting system approval
-
Residents can download popular fiction and non-fiction audio books
-
Will enable the Office of Counter-Terrorism and New Jersey State Police to connect the dots between local crimes that can serve as precursors of terrorist activity
-
"Enterprises that diligently use security best practices to protect their IP telephony servers should not let these threats derail their plans"
-
"An educated consumer is the first line of defense and a key way to stop phishing in its tracks"
-
"This breakthrough technology will allow us to shift our storage needs on demand, enable infrastructure standardization and vendor independence, and reduce the impact of future migration"
-
"Utah.gov was the only state Web site to receive a Government Customer Service Excellence Award, and we are particularly honored by Utah's selection." -- Utah Deputy CIO Al Sherwood
-
"They still rely on telephone and in-person contact and don't completely trust the Web. Even though most of these people use the Internet for other aspects of their daily lives, old habits die hard"
-
The system's support for .NET and Web services standards makes it easily customizable for integration into existing environments.
-
"This technology and our internal audit procedures have virtually eliminated authentication violations that were commonplace with the badge-and-pass code verification system." -- Tim Kulish, division manager for Connecticut DMV's Emissions Division
-
Illinois second state in the nation to require companies to notify consumers of security breaches
-
One-time use passcodes allow access to the network without the risk of stolen passwords that can be used to harvest large numbers of citizens' identities
-
"The commission continues to believe that emphasis should be placed on encouraging industry to develop alternatives, such as e-mail authentication, in lieu of a requirement for subject line labeling"
-
"This live test of e-Passports is an important step forward in a larger effort to enhance security and facilitate travel through international cooperation." US VISIT Director Jim Williams
-
HAVA-compliant voter verified paper audit trail
Most Read