Cybersecurity
-
Funding from the federal State and Local Cybersecurity Grant Program will support the delivery of multifactor authentication hard tokens to 161 local governments in New York state.
-
The auditor’s budget was cut after its refusal to join a countywide cyber program and contribute $1 million from its real estate assessment fund to help mitigate the cybersecurity costs.
-
Lawmakers in the Magnolia State are considering bills to make the state CIO a cabinet member, mirroring a national trend of CIOs evolving from tech managers to enterprise leaders — and to create a cybersecurity department.
More Stories
-
The Texas Digital Library is expected to reduce costly redundancies in licensing fees, digitization and access facilities, equipment, staff and operations through centralized licensing and delivery of information resources
-
"Since the goal of disaster recovery is to minimize costs resulting from loss or damage to IT facilities, the success of any data recovery plan depends a great deal on being able to determine the risks associated with data loss"
-
Implementation will include server migration services and a storage area network solution
-
Development Survey has found that 47% of APAC developers are increasing their adoption of open source in the next year
-
New Web-based application in Massachusetts contains a suite of information on registered sex offenders.
-
-
A new public-private partnership looks to create standards in the evolving world of privacy protection in the public sector.
-
Cites need to ensure continuity of federal operations in a disaster
-
New requirements will be established by the Department of Homeland Security and could include adding biometric information to drivers' licenses, such as fingerprints or retinal scans
-
"Security, even cyber security, cannot take the form of government dictates, but must be the product of strong partnership work and disciplined collaboration"
-
"To establish an enterprise policy ensuring the capture and maintenance of metadata and to establish minimum requirements for the specification and documentation of metadata for all enterprise systems development initiatives"
-
Need for identification not in question, says NGA, but Real ID Act contains "unreasonable burdens and unfunded mandates"
-
Manufacturers must assume full financial responsibility to meet state and federal laws
-
System allows courts to share information with federal and state law enforcement officials as well as authorized members of the public.
-
The site technician was able to isolate the exact computer used to e-mail the death threat, find the student who the computer was checked out to and arrest him.
-
City's solution combines intrusion detection and prevention with firewalls to securely connect the city's local area network and its SCADA system
-
Mr. Richter agrees to fundamental change of e-mailing practices, pays $7 million in damages
-
Company obtains a $13 million judgment against a group of New Hampshire spammers
Most Read