Cybersecurity
-
Navigating insights from the World Economic Forum’s meeting at Davos on AI-driven threats, the push for digital sovereignty and the weaponization of critical global infrastructure.
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
More Stories
-
Microsoft's Government Leaders Forum in Washington, D.C.
-
Will increase cooperation in information sharing, cybercrime and the financing of international terrorism
-
NAC technology checks the security level of any device requesting access to the local network and if it does not comply with the security policy established, access is denied
-
"This legislation is a fundamental challenge to the current common premise within public bodies that everything is secret unless stated otherwise"
-
Under the law, sending spam to state residents is punishable by imprisonment of five years and a fine of $50,000
-
"[These solutions] address the recommendations of the Department of Homeland Security for increasing our data sharing capability and improving our system's security"
-
Intermix Media accused of vast pattern of surreptitious installations
-
Wiretaps of wire, oral and electronic communications
-
"Portions of the USA PATRIOT Act abridge people's First Amendment right to read and think freely. In this country, we are entitled to read and research a topic or opinion without the fear that the government is looking over our shoulder"
-
An electronic passport without Basic Access Control (BAC) or encryption could potentially be used as a way to identify Americans traveling abroad
-
New law will ensure more timely response to FOIL inquiries by the media and public
-
"The majority of federal funding is going into services and products, such as antivirus and firewall technologies, instead of into research. This is not advancing us beyond the current platforms that require those add-on products to be used with a modicum of safety"
-
Caleb Tucker-Raymond, statewide digital reference project coordinator describes how L-net staff have marketed this new kind of library service
-
Provided a forum for communications and collaboration on technology solutions and business practices
-
"Until now, researchers were unable to model the true complexities of real-world Internet attacks"
-
Beginning in October 2007, auditors must provide a statement on the security measures in place based on the chosen standard
-
TUid is a unique number separate from a student or faculty member's social security number used for ID campuswide
-
Teams of students to design, test, build, defend and perform a forensic analysis on computer network systems