Cybersecurity
-
While overall ransomware attack numbers remained steady, higher education institutions drove a sharp rise in exposed records, fueled in part by third-party software vulnerabilities.
-
To guard against phishing-based ransomware attacks, the state is outfitting 161 of its jurisdictions and other public-sector organizations with hardware-based protection. And it's not alone.
-
Gov. Tim Walz has authorized $1.2 million in state emergency disaster assistance to address a cybersecurity incident that disrupted digital services in St. Paul for several weeks this summer.
More Stories
-
Paper-audit benchmarks established
-
Agency uses biometrics to reduce backlogs
-
Network Operations Center to monitor wireless broadband system using mesh-based technology
-
New law signed by Gov. Henry formalizes the state's Offender Data Information System
-
Law enforcement officials now have wireless access to a face recognition database from their patrol vehicles
-
Oregon county sheriff's office monitors offenders.
-
Iris scan and fingerprint recognition technology at Minneapolis/St. Paul, Los Angeles and Houston airports
-
Submission of police data over the years built a mountain of data without easy access to specific information
-
Police, fire and EMS personnel to be linked by one communications system
-
The U.S. Conference of Mayors released its June 2004 Interoperability Report
-
System utilizes existing infrastructure to increase safety and lower cost.
-
New system for inmate booking and release, visitor identification currently being piloted.
-
E-mail software automatically archives 17,000 users' e-mail
-
Police in Durham, North Carolina and Virginia use software to make computer-generated renderings of suspects
-
Statewide network will connect public-safety officials at all levels of government
-
Company changes its name to McAfee and is selling Sniffer Technologies business to refocus on security.
-
Wi-Fi security specification, 802.11i, received final approval from a standards group, with improvements to the quality and speed of wireless networks expected to follow.
-
New Zombie and Trojan Horse Threats Demand Layered Security Strategies
Most Read