Cybersecurity
-
Since making the change in the spring of 2025, officials have consolidated licenses and are pushing Internet to all city sites. Both initiatives combined have saved several hundreds of thousands of dollars.
-
Navigating insights from the World Economic Forum’s meeting at Davos on AI-driven threats, the push for digital sovereignty and the weaponization of critical global infrastructure.
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
More Stories
-
Targeted attacks are currently the biggest threat to corporate networks, according to Panda Software
-
The goal is to eradicate commercial child pornography by 2008
-
No longer happy to let websites await visitors, child-porn email campaigns are spamming invitations into inboxes
-
Despite some states' initial rush to buy all-digital voting machines, more than half of the nation's counties still will be voting with something that requires paper
-
"Not a single BPL trial has included a thorough examination of interference issues if deployed on a large scale. It is premature to pronounce these tests to be a complete success"
-
Electronic health records are key to transforming a fractural health-care system. Who's helping hospitals and physicians make the transition?
-
Free online resource where organizations may register their websites and receive notifications of online fraud attempts
-
-
America need not rush out to create a new bureaucracy to mimic Europe's approach to solving the privacy dilemma, but Americans deserve much more respect from the institutions, both public and private, that serve them
-
"Shared-use facilities hold the potential to improve the security of data by eliminating unneeded transmission links and standardizing security formats between the partners"
-
Provides more security per bit than other public-key cryptography
-
The incidence of data security breaches while computers are being moved from one facility to another -- either through theft or loss -- is on the rise
-
Staffed by professionals who volunteer their time,companies provide a resource to report and stop phishing scams
-
"in a one-year period 10 million Americans were victimized through identity theft, costing businesses $48 billion and consumers $5 billion"
-
Department of Homeland Security research by Coverity shows open source developers fixed defects every six minutes
-
WIPO also seeking to ensure that inventors and authors are recognized and rewarded for their ingenuity
-
Identity thieves from one end of the country can harm someone on the other end with the click of a mouse
-
Security "trust deficit" curtailing Americans' interest in doing business online, says group
Most Read