Cybersecurity
-
Navigating insights from the World Economic Forum’s meeting at Davos on AI-driven threats, the push for digital sovereignty and the weaponization of critical global infrastructure.
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
More Stories
-
Design provides security and authentication with wireless traffic routing back to the central location from each remote branch
-
Last week, the Cyber Security Industry Alliance issued a report titled "Teaching Children Cyber Security and Ethics" calling for the creation of a national K-12 curriculum for teaching children how to use the Internet safely and ethically.
-
"Through this program, we seek to ensure that newly discovered vulnerabilities are managed, disclosed and remediated responsibly, so they don't pose a threat to businesses"
-
Security technologist and author Bruce Schneier tackles identity theft questions and security issues.
-
The Texas Digital Library is expected to reduce costly redundancies in licensing fees, digitization and access facilities, equipment, staff and operations through centralized licensing and delivery of information resources
-
"Since the goal of disaster recovery is to minimize costs resulting from loss or damage to IT facilities, the success of any data recovery plan depends a great deal on being able to determine the risks associated with data loss"
-
Implementation will include server migration services and a storage area network solution
-
Development Survey has found that 47% of APAC developers are increasing their adoption of open source in the next year
-
New Web-based application in Massachusetts contains a suite of information on registered sex offenders.
-
-
A new public-private partnership looks to create standards in the evolving world of privacy protection in the public sector.
-
Cites need to ensure continuity of federal operations in a disaster
-
New requirements will be established by the Department of Homeland Security and could include adding biometric information to drivers' licenses, such as fingerprints or retinal scans
-
"Security, even cyber security, cannot take the form of government dictates, but must be the product of strong partnership work and disciplined collaboration"
-
"To establish an enterprise policy ensuring the capture and maintenance of metadata and to establish minimum requirements for the specification and documentation of metadata for all enterprise systems development initiatives"
-
Need for identification not in question, says NGA, but Real ID Act contains "unreasonable burdens and unfunded mandates"
-
Manufacturers must assume full financial responsibility to meet state and federal laws
-
System allows courts to share information with federal and state law enforcement officials as well as authorized members of the public.