Cybersecurity
-
Since making the change in the spring of 2025, officials have consolidated licenses and are pushing Internet to all city sites. Both initiatives combined have saved several hundreds of thousands of dollars.
-
Navigating insights from the World Economic Forum’s meeting at Davos on AI-driven threats, the push for digital sovereignty and the weaponization of critical global infrastructure.
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
More Stories
-
Access "not adequately restricted"
-
"DNA is the fingerprint of the 21st Century, but more than half of the individuals who are convicted of felony offenses in the state are still not required to provide a DNA sample for inclusion in the DNA Databank"
-
Using auditing software, the Comptroller of Maryland discovers millions in liquor retailers' unpaid taxes.
-
Lexar's LockTight CompactFlash locks down images on a Nikon D2X digital camera.
-
Reviewing another year in the life of the public-sector IT community.
-
NCSA joins effort to advocate for a national cyber awareness campaign
-
NCSL estimates that it will cost $9-$13 billion over six years for every state to comply with the Real ID Act regulations using current license-issuing techniques
-
The new system boasts faster transaction processing, enhanced record monitoring and provides more flexibility to law enforcement, courts and prosecutor's offices who submit information to the system
-
Calculated fraudulent misuse rate for breached identities less than one in 1,000
-
Redacting of private information becomes public responsibility as of Jan. 1
-
"Proactive technologies have ceased to be simply an option and are now a genuine necessity"
-
A long list of projects -- from laptop encryption to service-oriented architecture, new strategic sourcing initiatives and a revamp of the state's Web portal
-
What does not work is mandating patching as a part of a user contract agreement or having the government apply special taxes
-
"We must do everything to protect the integrity of the marketplace"
-
Protects critical data and systems from malicious attacks
-
-
Challenges remaining include malware, international cooperation, domain-level authentication
Most Read