Cybersecurity
-
Navigating insights from the World Economic Forum’s meeting at Davos on AI-driven threats, the push for digital sovereignty and the weaponization of critical global infrastructure.
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
More Stories
-
A New York state teenager arrested last month for threatening to tell other spammers how to send waves of unsolicited messages
-
'They spend millions of dollars a year on high-tech computer security defenses, but often fail to address the simplest, most critical aspect of information security: the human element'
-
-
-
Flaw would have allowed attackers to execute arbitrary code embedded in an XPM file stored on an infected machine
-
Creates uniform standards for voter identification, ballot counting, voting machine records, and the training of election judges and poll workers
-
-
"Organizations should perform a risk assessment of any handheld device installation to determine the types of security mechanisms that should be installed on devices and whether the cost is justified by the risk to the organization"
-
"If the mail server stops, we start getting calls from Costa Rica and South Africa within ten minutes"
-
For consideration at WSIS in November
-
"A Director-level position does not have the sufficient stature or programmatic authority for accountability, or to reach across sectors"
-
Department of Administration to conduct examination of all security systems
-
$19 million committed to interdisciplinary study of computer security over five years
-
The Rule imposes certain requirements on operators of Web sites or online services that have knowledge that they are collecting personal information from children under 13 years old
-
Identity theft victims in Ohio now have help putting their lives back together.
-
-
Confounded by government's relationship with data aggregators.
-
Information-sharing imperative