Cybersecurity
-
Navigating insights from the World Economic Forum’s meeting at Davos on AI-driven threats, the push for digital sovereignty and the weaponization of critical global infrastructure.
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
More Stories
-
'This document of security guidelines is going to play a key role in helping federal agencies effectively select and implement security controls and, by using a risk-based approach, do so in a cost-effective manner'
-
Financial information and credit card data of 1.2 million customers, possibly including that of all 100 U.S. senators and hundreds of thousands of other government employees gone missing
-
The standard provides graduated levels of security to give agencies flexibility in selecting the appropriate level of security for each application
-
'The challenge was how to send, retrieve and store millions of documents in an efficient manner while maintaining the authenticity of the records and guaranteeing the chain of custody'
-
A bill before the state's Senate transportation committee will improve security of DMV systems
-
New process will provide increased security and privacy
-
"This Committee will provide the Department with important recommendations on how to further the Department's mission while protecting the privacy of personally identifiable information of citizens and visitors of the United States"
-
'An advancement as important today as the construction of the first fireproof vaults to protect New Jersey's colonial archives was nearly 250 years ago.'
-
Digital Object Identifier also adopted for intellectual property ID and exchange
-
-
IT Council plans to establish funding to address security issues by late April.
-
'The data center had the capacity to serve as a magnet to induce collaboration -- that's what inspired us on the ASP model.'
-
U.S. Senate to hold hearings on security of personal data after recent leaks; FCRA revision in the works
-
'We've had everything from setting up a bio-terrorism analysis network where we collect and integrate data from all the emergency rooms around the county, to actually writing our own software for managing emergencies, for handling mass care situations'
-
Better public access among benefits
-
Phishing attacks will continue to evolve in 2005
-
275,000 online images expected to double within months
-
In support of 47 law enforcement agencies