Cybersecurity
-
The auditor’s budget was cut after its refusal to join a countywide cyber program and contribute $1 million from its real estate assessment fund to help mitigate the cybersecurity costs.
-
Lawmakers in the Magnolia State are considering bills to make the state CIO a cabinet member, mirroring a national trend of CIOs evolving from tech managers to enterprise leaders — and to create a cybersecurity department.
-
School and college administrators are among hundreds of attendees at this week's TEEX Cyber Readiness Summit, exploring a wide range of topics from AI and security to identity theft and human firewalls.
More Stories
-
"A rapidly spreading IM virus or worm can compromise a significant number of machines in a very short period of time, before signature patterns are known"
-
Phishing and hacker tactics as worrisome as concerns that banks sell personal information
-
Sentenced to 11 months' detention, two years of supervised release, with no computer, cell phone or other Internet access
-
"We wanted to give our Web site visitors a fast, self-service means to understand their own level of exposure"
-
"Disasters bring out both the best and the very worst in people."
-
At least 104 data incidents have been documented in the U.S., potentially affecting more than 56.2 million individuals
-
Computer break-in could leave current and former employees of San Diego County vulnerable to identity theft.
-
The United States will support effort over the next two years with new equipment, computers, and other materials, and will provide training in the handling of terrorism, money laundering, cyber crime and other transnational crime cases
-
"Attackers are moving away from large, multipurpose attacks on network perimeters and toward smaller, more targeted attacks directed at Web and client-side applications"
-
"[The network's] reliable security was the perfect fit for setting up secure remote voter registration sites not only for that special election circumstance, but for future elections as well"
-
"CVSS solves the problem of multiple, incompatible scoring systems and is usable and understandable by anyone"
-
"One hundred percent security will never be obtainable. If you think you're safe, you're not secure. 9/11 taught us not to say things won't occur. Vigilance has to be there. Cars are becoming safer every day but you still need to buckle your seat belt"
-
New York's CIO Council plans to issue a report on its strategic plan for IAM in October
-
The goal of the warranty is to "promote the adoption of proactive risk management strategies and security policy compliance to protect the nation's critical computer networks from cyberattack"
-
Most young people have the expectation that computers can talk to one another
-
"Technology is not the issue here. What we're taking about is what's traditionally called organization"
-
E-Authentication is a centralized network that provides identity management services that simplify and secure how citizens, businesses, and government employees access to government Web applications.
-
Most Read
- Connecticut Legislature to Address Cellphones, Social Media
- Déjà Vu: Are There Throughlines From Dot-com to Dot-ai?
- Washington State Senate Passes Bill on License Plate Camera Data
- Point Park University Deploys AI Chatbot for Admissions Help
- Spokane Public Schools Automates Floor Cleaning With Robots