Cybersecurity
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
-
After a phishing incident in December initially cost Warren County over $3.3 million, officials may soon pass a thorough computer use policy for county employees that will touch on related issues.
More Stories
-
'By working closely with my local counterparts, I quickly learned the unintended consequences that can occur when designing a system that affects others.'
-
City of Fayetteville, Ark., Uses Programmable Locks to Secure City Hall, Police and Fire DepartmentsSupervisor uses a laptop to program locks
-
'We got lazy. We dropped our guard.' -- former Secretary of Defense William Cohen to IT executives in Pennsylvania
-
Survey online for the next two weeks to gather input for development of Web-based GIS data standards
-
Provincewide mugshot storage and sharing system
-
Prop 69 expands DNA sampling to all felons; prop 59 provides for more transparent government
-
"Meeting a request that involved only a few e-mails could take anywhere from eight to 20 hours, so looking for month's worth of data could take weeks...." -- Michael Lee Sherwood, Oceanside's CIO
-
Number of professionals to grow at a 13.7 percent compound annual growth rate compared with 2003
-
"Preservation of born digital content in state government is becoming a significant business challenge which will require the collaboration of state CIOs, archivists, librarians and state agencies," according to Doug Robinson, executive director for the National Association of State Chief Information Officers (NASCIO)
-
Lack of a broad, uniform government policy has exposed personal social security numbers in public records and on identity cards
-
Provides management with reports of activity that may not conform to the county's Internet usage policy
-
GE Infrastructure Security and Deister Electronics join the group to promote interoperability of security products
-
Falsification of sender information, volume of messages lead to "first ever" felony spam convictions
-
Spam over Internet telephony not prevalent yet, experts say
-
The rule requires covered entities "take reasonable measures to protect against unauthorized access to or use of the information in connection with its disposal"
-
"The scope of issues and risks bombarding network and security administrators is driving a merging of security and networking"
-
-
"Operation Peerless" uncovers 3,600 computers used to distribute child pornography