Cybersecurity
-
After a phishing incident in December initially cost Warren County over $3.3 million, officials may soon pass a thorough computer use policy for county employees that will touch on related issues.
-
Funding from the federal State and Local Cybersecurity Grant Program will support the delivery of multifactor authentication hard tokens to 161 local governments in New York state.
-
The auditor’s budget was cut after its refusal to join a countywide cyber program and contribute $1 million from its real estate assessment fund to help mitigate the cybersecurity costs.
More Stories
-
Last week, Harvard University's Berkman Center and the Oxford Internet Institute launched a "Neighborhood Watch" initiative against spyware and other malicious software programs
-
Project management, security and more are topics of the day
-
Transformation rests on four interlocking capabilities: identity management, CRM/case management, document management, and forms management
-
-
Missouri Attorney General Jay Nixon yesterday obtained a court order to prevent an Internet business and its owners from offering to sell the records of cell phone customers in Missouri
-
Victor emphasized the old joke about two men running from a hungry lion. To survive, one man needn't run faster than the lion, just faster than the other man. And so it is with security, he said
-
How can you claim to have control of security when an outside contractor has root passwords?
-
Only about a third considered that wireless public Internet access was likely to deliver significant community value
-
Digital does not mean "different" where government's responsibility is concerned
-
Google applauded for courage in resisting Justice Department subpoena
-
Weblogs are booming, but the latest survey conducted by the Employment Law Alliance, a large network of employment and labor lawyers, is reporting that only about 15% of employers have specific policies addressing work-related blogging
-
The 2006 Identity Fraud Survey Report - released by the Council of Better Business Bureaus and Javelin Strategy & Research - provides new information on how identity fraud occurs, counterintuitive insights that challenge conventionally accepted beliefs about these crimes, and steps consumers can take to further protect themselves against this problem
-
"We're in the middle of an intense discussion over whether voting systems that rely on proprietary software, such as Diebold, should be certified or re-certified for use here in California for the 2006 elections"
-
Rise in breaches and spyware sophistication result in record infection rates, says company
-
Notaries are one of the most powerful weapons we have against the ever-increasing onslaught of identity crimes
-
-
"Right now, many victims of identity theft don't report the problem to the authorities"
-