Cybersecurity
-
Navigating insights from the World Economic Forum’s meeting at Davos on AI-driven threats, the push for digital sovereignty and the weaponization of critical global infrastructure.
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
More Stories
-
Google Print Library allegedly violates publishers' and authors' rights
-
Police and fire departments no longer need to set up independent physical networks at an incident site.
-
"This is an opportunity to build Wi-Fi and most importantly, WiMAX networks with a wider range. But the telephone companies are not interested in going there. They've had a chance. Why don't we let ISPs, municipal authorities, or even communities finance and own a small Wi-Fi network that can link its community to the world?"
-
Simplified day-to-day network security management
-
The State Department plans to issue the first U.S. electronic passports in December 2005
-
Nearly half of American organizations haven't adopted records retention policies for e-mail and other electronic documents, according to the survey
-
Microsoft revealed technological and legal maneuvers it has used to unmask the individuals using several zombies to send spam
-
$15 million deal with Diebold Election Systems
-
New ID card architecture and thumbprint and facial verification
-
Solution leverages RFID technology to determine the real-time location of critical assets
-
Project aimed at bringing Kentucky's underprivileged households into the Information Age
-
The Real ID Act: A national ID card in disguise? Or necessary 21st-century security?
-
Michigan and Utah implement child protection registries to keep inappropriate e-mail out of children's inboxes, and raise questions in the process.
-
-
"...chief information security officers know it's not a question of whether a targeted or zero-day attack happens, but when"
-
FCC ruling requires broadband Internet and interconnected voice-over Internet Protocol (VOIP) services be designed to make government wiretapping easier
-
Goal of hackers today is no longer widespread system shutdown, but rather more frequent, smaller attacks
-
The law would require Internet cafes as well as commercial businesses that use wireless networks to take basic security precautions to protect private customer information from potential data thieves and hackers
Most Read