Cybersecurity
-
Navigating insights from the World Economic Forum’s meeting at Davos on AI-driven threats, the push for digital sovereignty and the weaponization of critical global infrastructure.
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
More Stories
-
"Phishing is still a new enough phenomenon that we are not surprised to see this kind of month to month fluctuation"
-
As of 2005, Erie County now has one integrated email system used by all departments and one directory service
-
-
Database contains inventory of contents of Gulf Coast chemical industry facilities
-
"To provide our office and the public with a complete records management solution continuing to offer public access to these records via the Internet, automated indexing and the electronic recording of documents"
-
Phishing and hacker tactics as worrisome as concerns that banks sell personal information
-
"A rapidly spreading IM virus or worm can compromise a significant number of machines in a very short period of time, before signature patterns are known"
-
Sentenced to 11 months' detention, two years of supervised release, with no computer, cell phone or other Internet access
-
"Disasters bring out both the best and the very worst in people."
-
"We wanted to give our Web site visitors a fast, self-service means to understand their own level of exposure"
-
At least 104 data incidents have been documented in the U.S., potentially affecting more than 56.2 million individuals
-
Computer break-in could leave current and former employees of San Diego County vulnerable to identity theft.
-
The United States will support effort over the next two years with new equipment, computers, and other materials, and will provide training in the handling of terrorism, money laundering, cyber crime and other transnational crime cases
-
"Attackers are moving away from large, multipurpose attacks on network perimeters and toward smaller, more targeted attacks directed at Web and client-side applications"
-
"[The network's] reliable security was the perfect fit for setting up secure remote voter registration sites not only for that special election circumstance, but for future elections as well"
-
"CVSS solves the problem of multiple, incompatible scoring systems and is usable and understandable by anyone"
-
"One hundred percent security will never be obtainable. If you think you're safe, you're not secure. 9/11 taught us not to say things won't occur. Vigilance has to be there. Cars are becoming safer every day but you still need to buckle your seat belt"
-
New York's CIO Council plans to issue a report on its strategic plan for IAM in October