Cybersecurity
-
Funding from the federal State and Local Cybersecurity Grant Program will support the delivery of multifactor authentication hard tokens to 161 local governments in New York state.
-
The auditor’s budget was cut after its refusal to join a countywide cyber program and contribute $1 million from its real estate assessment fund to help mitigate the cybersecurity costs.
-
Lawmakers in the Magnolia State are considering bills to make the state CIO a cabinet member, mirroring a national trend of CIOs evolving from tech managers to enterprise leaders — and to create a cybersecurity department.
More Stories
-
Reducing risk and demonstrating regulatory compliance top the list of concerns for businesses
-
The holder of this new position will be responsible for identifying and assessing the vulnerability of critical telecommunications infrastructure and assets; providing timely, actionable and valuable threat information; and leading the national response to cyber and telecommunications attacks
-
Comments accepted through the mail or electronically until Sept. 13
-
"The state CIOs have made addressing deficiencies in public-sector cybersecurity the number one item on NASCIO's federal agenda"
-
"We had an old system that just couldn't adapt and grow to meet our needs"
-
Thirty speakers provided critical analysis over two days on many headline issues, including identity theft, data security, terrorist financing, money laundering, Internet fraud, and information security regulation
-
Like all cargo, records, documents and back-up tapes are most vulnerable while traveling from one place to another
-
"While trusted clients are helping enterprises keep data and systems more secure, a truly secure enterprise requires enhanced trust and security in its servers to protect their critical server-based data and transactions that are often the foundation of businesses"
-
"Extending voting rights into war zones is an extreme application of e- voting technology, but it demonstrates what a powerful tool it is for private sector elections"
-
"The Center will use sophisticated information technology to identify and stop emerging crime quickly. It will help police stop spikes in crime before they become trends, and make sure dangerous criminals are caught before they can hurt others"
-
Helps determine whether Nebraskans are at low, moderate, or high risk for becoming victims of fraud
-
At a time when consumers' personal information appears to be stored in a glass house with a revolving door, MyPublicInfo of Arlington, Va., is offering consumers with a tool that lets them know what information has been collected about them, who they might be confused with and what they can do about it
-
The Kansas State Board of Nursing licenses and renews more than 2,000 nurses each month. The process now takes less than a minute, saving time and improving efficiency.
-
Measures address data breaches, identity theft, victims' rights and spyware.
-
Design provides security and authentication with wireless traffic routing back to the central location from each remote branch
-
Last week, the Cyber Security Industry Alliance issued a report titled "Teaching Children Cyber Security and Ethics" calling for the creation of a national K-12 curriculum for teaching children how to use the Internet safely and ethically.
-
"Through this program, we seek to ensure that newly discovered vulnerabilities are managed, disclosed and remediated responsibly, so they don't pose a threat to businesses"
-
Security technologist and author Bruce Schneier tackles identity theft questions and security issues.