Cybersecurity
-
Lawmakers in the Magnolia State are considering bills to make the state CIO a cabinet member, mirroring a national trend of CIOs evolving from tech managers to enterprise leaders — and to create a cybersecurity department.
-
School and college administrators are among hundreds of attendees at this week's TEEX Cyber Readiness Summit, exploring a wide range of topics from AI and security to identity theft and human firewalls.
-
As artificial intelligence continues to evolve, how can public-sector teams prepare organizationally for the next generation of cyber attacks and equip themselves with the right tools?
More Stories
-
Implementation will include server migration services and a storage area network solution
-
Development Survey has found that 47% of APAC developers are increasing their adoption of open source in the next year
-
New Web-based application in Massachusetts contains a suite of information on registered sex offenders.
-
-
A new public-private partnership looks to create standards in the evolving world of privacy protection in the public sector.
-
Cites need to ensure continuity of federal operations in a disaster
-
New requirements will be established by the Department of Homeland Security and could include adding biometric information to drivers' licenses, such as fingerprints or retinal scans
-
"Security, even cyber security, cannot take the form of government dictates, but must be the product of strong partnership work and disciplined collaboration"
-
"To establish an enterprise policy ensuring the capture and maintenance of metadata and to establish minimum requirements for the specification and documentation of metadata for all enterprise systems development initiatives"
-
Need for identification not in question, says NGA, but Real ID Act contains "unreasonable burdens and unfunded mandates"
-
Manufacturers must assume full financial responsibility to meet state and federal laws
-
System allows courts to share information with federal and state law enforcement officials as well as authorized members of the public.
-
The site technician was able to isolate the exact computer used to e-mail the death threat, find the student who the computer was checked out to and arrest him.
-
City's solution combines intrusion detection and prevention with firewalls to securely connect the city's local area network and its SCADA system
-
Mr. Richter agrees to fundamental change of e-mailing practices, pays $7 million in damages
-
Company obtains a $13 million judgment against a group of New Hampshire spammers
-
"We have a covenant with our kids to protect them. This legislation will give law enforcement ... tools they need to fight cyber predators"
-
The installation, completed last month, is the first of three phases aimed at upgrading security in Prospect Heights
Most Read