Cybersecurity
-
Navigating insights from the World Economic Forum’s meeting at Davos on AI-driven threats, the push for digital sovereignty and the weaponization of critical global infrastructure.
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
More Stories
-
U.S. Consumers Willing to Pay Premium for Fingerprint Biometrics to Make Life Easier and More SecureAs many as 71 percent of U.S. consumers favor adding feature to PCs and cell phones for password replacement, mobile commerce, wireless banking and other functions
-
Companies partner in creating center to predict and prevent against viruses, spam and other threats spread through instant messaging and P2P
-
City requests more information from company relating to security assessment
-
Company ratings are posted on Internet where users can check the current e-mail privacy ratings for more than 800 prominent organizations
-
Ann Garrett named Information Security Executive of the Year 2004
-
With reports of Microsoft alleging over 200 software patents are used in the Linux operating system, fresh concerns have been raised over the legal risks for companies using or switching to open source software. Fortunately, open source risks are less for state governments
-
'We will see RFPs next year on statewide contracts that will reduce costs.'
-
Eighty-eight percent were malicious attacks such as spam, phishing, viruses, and directory harvest attacks company finds
-
TSA's total commitment for O'Hare International Airport is now $59.4 million
-
Winning program provides an early-warning system that alerted you days in advance of potential problems from any segment and multiple segments of your network
-
E-mail security firm predicts legitimate e-mail will drop from 12% to 8% of all messages sent in 2005
-
Forty-four security flaws found affect applications that vary in popularity
-
Agreement not only saves the $100 million, but also simplifies computer maintenance
-
Bugs range from buffer overflows, over-information-leak and path-truncation vulnerabilities to safe_mode restriction bypass vulnerabilities
-
Stanford computer science researchers analyze 5.7 million lines of software and identify 985 bugs -- most already fixed by open source community.
-
System to be fully implemented by December 2005
-
"Who Are You? I Really Wanna Know: E-Authentication and its Privacy Implications"
-
New partners in anti-virus, client security and patch management underscore ongoing industry collaboration to help customers build intelligent security systems