Cybersecurity
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
-
After a phishing incident in December initially cost Warren County over $3.3 million, officials may soon pass a thorough computer use policy for county employees that will touch on related issues.
More Stories
-
NIST standards and guidelines needed for FISMA compliance
-
A federal district court in Nevada has ruled that Google does not violate copyright law when it copies websites, stores the copies, and transmits them to Internet users as part of its Google Cache feature
-
Last week, Harvard University's Berkman Center and the Oxford Internet Institute launched a "Neighborhood Watch" initiative against spyware and other malicious software programs
-
Project management, security and more are topics of the day
-
-
Transformation rests on four interlocking capabilities: identity management, CRM/case management, document management, and forms management
-
Missouri Attorney General Jay Nixon yesterday obtained a court order to prevent an Internet business and its owners from offering to sell the records of cell phone customers in Missouri
-
Victor emphasized the old joke about two men running from a hungry lion. To survive, one man needn't run faster than the lion, just faster than the other man. And so it is with security, he said
-
How can you claim to have control of security when an outside contractor has root passwords?
-
Only about a third considered that wireless public Internet access was likely to deliver significant community value
-
Digital does not mean "different" where government's responsibility is concerned
-
Google applauded for courage in resisting Justice Department subpoena
-
Weblogs are booming, but the latest survey conducted by the Employment Law Alliance, a large network of employment and labor lawyers, is reporting that only about 15% of employers have specific policies addressing work-related blogging
-
The 2006 Identity Fraud Survey Report - released by the Council of Better Business Bureaus and Javelin Strategy & Research - provides new information on how identity fraud occurs, counterintuitive insights that challenge conventionally accepted beliefs about these crimes, and steps consumers can take to further protect themselves against this problem
-
"We're in the middle of an intense discussion over whether voting systems that rely on proprietary software, such as Diebold, should be certified or re-certified for use here in California for the 2006 elections"
-
Rise in breaches and spyware sophistication result in record infection rates, says company
-
Notaries are one of the most powerful weapons we have against the ever-increasing onslaught of identity crimes
-