Cybersecurity
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
-
After a phishing incident in December initially cost Warren County over $3.3 million, officials may soon pass a thorough computer use policy for county employees that will touch on related issues.
More Stories
-
A proposal requiring local businesses to secure their wireless networks to protect their customers against identity theft and other computer fraud has become law
-
Multimedia presentations of actual application attacks will provide an inside look into application penetration in the real world, and will be countered with remediation strategies for attack avoidance
-
Effort to empower teens to be cyber safe and spread the message to their peers, families, communities, and beyond
-
"Californians have a right to privacy and pretexting not only violates that right, it makes every single one of these victims a prime candidate for identity theft."
-
-
Prohibits any state agency, department or board from revealing or placing the Social Security number of a person on any document available for public inspection without the person's consent
-
Rising costs and changing threats give no ground for complacency
-
Replacing a 30-year-old reel-to-reel taping system with the improved sound and clarity of a digital recording system to record Kentucky-related books for patrons who cannot read standard print because of a disability
-
Unprotected PCs survive half as long today as they did two years ago.
-
-
Backward-compatible standard increases interoperability and security
-
Wide sweep results in arrests or convictions of more than 150 individuals
-
Coating Prevents Electromagnetic Radiation from Escaping from Devices Containing Sensitive Data
-
"The failover occurs between sites so if you were to come over to my building and drop a grenade in my data center, the nodes on the other side would essentially begin running the services"
-
System downtime caused by software vulnerabilities will triple by 2008 for organizations that don't take proactive security steps
-
Data preservation -- the retention of data for a specific case and for a finite period, as practiced in the U.S. and elsewhere -- should remain the preferred method for investigative cooperation, and member states should be permitted to favor preservation over retention
-
Policy touted as the Office for Technology's "security constitution"
-
The computer's ID is stored on a chip and encrypted to limit access to a special processor