Cybersecurity
-
Navigating insights from the World Economic Forum’s meeting at Davos on AI-driven threats, the push for digital sovereignty and the weaponization of critical global infrastructure.
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
More Stories
-
Consumers demand greater protection and restitution
-
Report reveals more than 2,700 percent increase in viruses, worms, phishing and malicious attacks targeting IM networks over previous year
-
Microsoft to pay reward to Sasser worm informants
-
Federal, state and local government agencies and services invited to participate
-
Reducing risk and demonstrating regulatory compliance top the list of concerns for businesses
-
The holder of this new position will be responsible for identifying and assessing the vulnerability of critical telecommunications infrastructure and assets; providing timely, actionable and valuable threat information; and leading the national response to cyber and telecommunications attacks
-
Comments accepted through the mail or electronically until Sept. 13
-
"The state CIOs have made addressing deficiencies in public-sector cybersecurity the number one item on NASCIO's federal agenda"
-
"We had an old system that just couldn't adapt and grow to meet our needs"
-
Thirty speakers provided critical analysis over two days on many headline issues, including identity theft, data security, terrorist financing, money laundering, Internet fraud, and information security regulation
-
Like all cargo, records, documents and back-up tapes are most vulnerable while traveling from one place to another
-
"While trusted clients are helping enterprises keep data and systems more secure, a truly secure enterprise requires enhanced trust and security in its servers to protect their critical server-based data and transactions that are often the foundation of businesses"
-
"Extending voting rights into war zones is an extreme application of e- voting technology, but it demonstrates what a powerful tool it is for private sector elections"
-
"The Center will use sophisticated information technology to identify and stop emerging crime quickly. It will help police stop spikes in crime before they become trends, and make sure dangerous criminals are caught before they can hurt others"
-
Helps determine whether Nebraskans are at low, moderate, or high risk for becoming victims of fraud
-
At a time when consumers' personal information appears to be stored in a glass house with a revolving door, MyPublicInfo of Arlington, Va., is offering consumers with a tool that lets them know what information has been collected about them, who they might be confused with and what they can do about it
-
The Kansas State Board of Nursing licenses and renews more than 2,000 nurses each month. The process now takes less than a minute, saving time and improving efficiency.
-
Measures address data breaches, identity theft, victims' rights and spyware.