Cybersecurity
-
Navigating insights from the World Economic Forum’s meeting at Davos on AI-driven threats, the push for digital sovereignty and the weaponization of critical global infrastructure.
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
More Stories
-
'Consumers need the right to lock up their credit files with a security freeze to prevent thieves from getting credit in their names'
-
Washington state utilizes digital archiving to immortalize a legacy.
-
News comes as U.S. Senate considers tighter regulation of data brokers
-
The Digital City ICT applications aim to improve everyday life by simplifying public transactions, reducing telecommunication costs and by delivering new services related to the local way of life
-
Personal data belonging to 8,900 Nevada motorists stolen
-
To focus on communications interoperability and commercial applications of IPv6, the New Internet
-
Contains classifications of products using technology to address 14 different challenges
-
Solution protects students and staff from spam, phishing and viruses
-
New technology uses the IP address of the originating computer to determine the legitimacy of incoming e-mail messages
-
Pleaded guilty to breaking into the network and attempting to cover his tracks
-
'Many legislators are bent on tackling a problem they need to know more about'
-
'Only a proxy-based solution can prevent spyware while actually improving overall Web performance'
-
Bogus emergency calls increased load on 9-1-1 call centers and prompted police to be dispatched unnecessarily
-
'The state of IT is good. We have a robust IT infrastructure and when it comes to challenges, we're ahead of our peers'
-
The bi-annual report provides analysis and discussion of trends in Internet attacks, vulnerabilities, malicious code activity, and additional security risks for the period of July 1, 2004 to Dec. 31, 2004.
-
Major service providers share real-time network attack profiles across global network boundaries
-
Half of organizations have no IM policies despite numerous enterprise security risks
-
contained files with the names and Social Security numbers of more than 98,000 individuals