Cybersecurity
-
Lawmakers in the Magnolia State are considering bills to make the state CIO a cabinet member, mirroring a national trend of CIOs evolving from tech managers to enterprise leaders — and to create a cybersecurity department.
-
School and college administrators are among hundreds of attendees at this week's TEEX Cyber Readiness Summit, exploring a wide range of topics from AI and security to identity theft and human firewalls.
-
As artificial intelligence continues to evolve, how can public-sector teams prepare organizationally for the next generation of cyber attacks and equip themselves with the right tools?
More Stories
-
Comments accepted through the mail or electronically until Sept. 13
-
"The state CIOs have made addressing deficiencies in public-sector cybersecurity the number one item on NASCIO's federal agenda"
-
"We had an old system that just couldn't adapt and grow to meet our needs"
-
Thirty speakers provided critical analysis over two days on many headline issues, including identity theft, data security, terrorist financing, money laundering, Internet fraud, and information security regulation
-
Like all cargo, records, documents and back-up tapes are most vulnerable while traveling from one place to another
-
"While trusted clients are helping enterprises keep data and systems more secure, a truly secure enterprise requires enhanced trust and security in its servers to protect their critical server-based data and transactions that are often the foundation of businesses"
-
"Extending voting rights into war zones is an extreme application of e- voting technology, but it demonstrates what a powerful tool it is for private sector elections"
-
"The Center will use sophisticated information technology to identify and stop emerging crime quickly. It will help police stop spikes in crime before they become trends, and make sure dangerous criminals are caught before they can hurt others"
-
Helps determine whether Nebraskans are at low, moderate, or high risk for becoming victims of fraud
-
At a time when consumers' personal information appears to be stored in a glass house with a revolving door, MyPublicInfo of Arlington, Va., is offering consumers with a tool that lets them know what information has been collected about them, who they might be confused with and what they can do about it
-
The Kansas State Board of Nursing licenses and renews more than 2,000 nurses each month. The process now takes less than a minute, saving time and improving efficiency.
-
Measures address data breaches, identity theft, victims' rights and spyware.
-
Design provides security and authentication with wireless traffic routing back to the central location from each remote branch
-
Last week, the Cyber Security Industry Alliance issued a report titled "Teaching Children Cyber Security and Ethics" calling for the creation of a national K-12 curriculum for teaching children how to use the Internet safely and ethically.
-
"Through this program, we seek to ensure that newly discovered vulnerabilities are managed, disclosed and remediated responsibly, so they don't pose a threat to businesses"
-
Security technologist and author Bruce Schneier tackles identity theft questions and security issues.
-
The Texas Digital Library is expected to reduce costly redundancies in licensing fees, digitization and access facilities, equipment, staff and operations through centralized licensing and delivery of information resources
-
"Since the goal of disaster recovery is to minimize costs resulting from loss or damage to IT facilities, the success of any data recovery plan depends a great deal on being able to determine the risks associated with data loss"
Most Read