Cybersecurity
-
Since making the change in the spring of 2025, officials have consolidated licenses and are pushing Internet to all city sites. Both initiatives combined have saved several hundreds of thousands of dollars.
-
Navigating insights from the World Economic Forum’s meeting at Davos on AI-driven threats, the push for digital sovereignty and the weaponization of critical global infrastructure.
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
More Stories
-
The Information Technology Association of America (ITAA) recently urged the Departments of State and Homeland Security to move ahead with plans to purchase a technology system that would help secure and expedite travel to and from Mexico, Canada and other western hemisphere locations
-
Data accessed includes some Social Security numbers and possibly other biographical data, including those of alumni, faculty, staff and current and prospective students of the business school as well as corporate recruiters
-
A proposal requiring local businesses to secure their wireless networks to protect their customers against identity theft and other computer fraud has become law
-
Multimedia presentations of actual application attacks will provide an inside look into application penetration in the real world, and will be countered with remediation strategies for attack avoidance
-
Effort to empower teens to be cyber safe and spread the message to their peers, families, communities, and beyond
-
"Californians have a right to privacy and pretexting not only violates that right, it makes every single one of these victims a prime candidate for identity theft."
-
-
Prohibits any state agency, department or board from revealing or placing the Social Security number of a person on any document available for public inspection without the person's consent
-
Rising costs and changing threats give no ground for complacency
-
Replacing a 30-year-old reel-to-reel taping system with the improved sound and clarity of a digital recording system to record Kentucky-related books for patrons who cannot read standard print because of a disability
-
Unprotected PCs survive half as long today as they did two years ago.
-
-
Backward-compatible standard increases interoperability and security
-
Wide sweep results in arrests or convictions of more than 150 individuals
-
Coating Prevents Electromagnetic Radiation from Escaping from Devices Containing Sensitive Data
-
"The failover occurs between sites so if you were to come over to my building and drop a grenade in my data center, the nodes on the other side would essentially begin running the services"
-
System downtime caused by software vulnerabilities will triple by 2008 for organizations that don't take proactive security steps
-
Data preservation -- the retention of data for a specific case and for a finite period, as practiced in the U.S. and elsewhere -- should remain the preferred method for investigative cooperation, and member states should be permitted to favor preservation over retention
Most Read