Cybersecurity
-
Lawmakers in the Magnolia State are considering bills to make the state CIO a cabinet member, mirroring a national trend of CIOs evolving from tech managers to enterprise leaders — and to create a cybersecurity department.
-
School and college administrators are among hundreds of attendees at this week's TEEX Cyber Readiness Summit, exploring a wide range of topics from AI and security to identity theft and human firewalls.
-
As artificial intelligence continues to evolve, how can public-sector teams prepare organizationally for the next generation of cyber attacks and equip themselves with the right tools?
More Stories
-
16th Annual Association of Certified Fraud Examiner's Fraud Conference & Exhibition being held July 10-15, 2005 in Washington, D.C.
-
"In light of recent national media reports about the release of confidential information by a credit card company, it is critical that each agency follow the existing policy requiring that every media system should be sanitized prior to being sent to the Division of Surplus Property for disposal."
-
Signed by the United States in November 2001, the Convention on Cybercrime is the first and only international, multilateral treaty specifically addressing the need for cooperation in the investigation and prosecution of computer network crimes
-
Center for Democracy and Technology introduces Open CRS Web site
-
The city's reliable way to extend the city network to a new building
-
The new systems give the county powerful mobile inspection capabilities
-
"Virtual County Clerk's Office is a modern necessity" -- Peter Schlussler Director of Information Technology for Suffolk County
-
System will incorporate a facial image recognition system
-
Creates a patient-centered community health record available to multiple providers
-
New child ID cards available to parents in 18 counties by fall
-
"To stop spam, phishing and other forms of messaging abuse, we must first rid the Internet of sender forgery and the use of zombie networks and prevent criminals from hiding behind veils of anonymity."
-
"In just the first and second quarters of 2005, the number of exploited machines using backdoor techniques has increased over 63 percent from the total at the end of 2004"
-
Consumers demand greater protection and restitution
-
Report reveals more than 2,700 percent increase in viruses, worms, phishing and malicious attacks targeting IM networks over previous year
-
Microsoft to pay reward to Sasser worm informants
-
Federal, state and local government agencies and services invited to participate
-
Reducing risk and demonstrating regulatory compliance top the list of concerns for businesses
-
The holder of this new position will be responsible for identifying and assessing the vulnerability of critical telecommunications infrastructure and assets; providing timely, actionable and valuable threat information; and leading the national response to cyber and telecommunications attacks
Most Read