Cybersecurity
-
Since making the change in the spring of 2025, officials have consolidated licenses and are pushing Internet to all city sites. Both initiatives combined have saved several hundreds of thousands of dollars.
-
Navigating insights from the World Economic Forum’s meeting at Davos on AI-driven threats, the push for digital sovereignty and the weaponization of critical global infrastructure.
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
More Stories
-
Hidden technology allegedly makes computers vulnerable to viruses and hacking
-
"We believe that the people of this country should be able to hear or read ideas from any speaker or writer without our government's restricting our access to a full range of perspectives"
-
"Auditors must be increasingly diligent as they seek to prevent intrusions and security compromises within state systems"
-
Hack of systems to be attempted
-
-
Arizona leads the nation in identity theft victims per capita, followed by adjoining states Nevada and California
-
The state plans to negotiate a master contract, which may involve multiple vendors
-
"Being aware of cyber crimes is the first step in preventing them."
-
ISP filters block as much as 95% of unsolicited e-mail
-
Four initiatives to fight identity theft
-
Anti-virus products still leave a significant window of vulnerability
-
Draft rewrite of telecommunications law of 1996 a "bait 'n switch."
-
Microsoft to take actions to make Office XML format technology an international standard
-
Thirty-eight of the state's 39 counties had been tallied, and the state waited, electrified, for the final county's results. The reason? The candidates were only eight votes apart
-
The complaint alleges that the state has failed to meet its legal responsibilities to conduct a general program to maintain its voter registration list for federal elections
-
"The tiny sensor also has found interest from law enforcement officials in both Taiwan and the United States where some officials see it being used to track missing children"
-
"There is a lot of talk in the security market about 'network access control.' NAC is really the holy grail of network security, and is no simple feat, as it will impact all types of products ..."
-
On average, one in every 44 e-mails was viral during 2005. This rose to one in 12 during major outbreaks, while 15,907 new malware threats were identified
Most Read