Cybersecurity
-
Navigating insights from the World Economic Forum’s meeting at Davos on AI-driven threats, the push for digital sovereignty and the weaponization of critical global infrastructure.
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
More Stories
-
'We need our data to be online and always available, because it is my belief that once you put it on a physical device that is off the network, it becomes less useful'
-
'Healthcare settings encounter one of the most data-intensive environments, and hence, high scalability at very low costs is anticipated to be a key differentiation factor for storage management solutions.'
-
'Archiving used to be simple: Copy files to tape and toss them in a warehouse.'
-
'We leverage the SAN as an integral component to our overall IT infrastructure and disaster recovery initiatives.'
-
Acting Governor Richard J. Codey recently discussed details of the school security plan he outlined in his State of the State speech
-
Focus on business processes and business intelligence to move IT from commodity to business contribution
-
Internet service providers, the Federal Trade Commission (FTC) and private citizens cooperate to track the origin of spam.
-
'With the almost daily advances in technology, it is critical for government to have the ability to adapt. This legislation gives government the flexibility it needs to do just that.'
-
Travis County expects to raise $1 million a year, which can be used for computerized indexes and scanning
-
Documents are scanned, put into electronic storage and backed up on a CD-ROM.
-
'The technology used in the Public Vaults enables us to give the public a taste of the breadth and depth of the Archives, and a fun, interactive way to navigate them.'
-
Network allows law enforcement agencies to quickly pull information, such as mug shots and traffic reports, from other departments' records management systems in a cost-efficient manner.
-
Police officers are too busy to rebuild lost criminal files, warrant records and investigative reports. Voter lists -- archived in the capital city -- will need to have the names of thousands of deceased removed
-
State struggles to meet Jan. 1, 2006 deadline for Help America Vote Act implementation
-
New law makes it illegal to use the Internet to lure someone into committing a crime
-
Act includes criminal penalties for sending fraudulent and deceptive e-mail
-
'Our message to potential partners is that we are looking at new ideas, and if we see a way to bring value, we are open to listening. We will reduce government cost whether we have a budget problem or not. We will support effective technology contracting and execution.'
-
Office 2003 documents will be viewable with any reader, including open source or GPL