Cybersecurity
-
From compromised TVs to AI-powered house chores, exploring the evolving global threats and why human-centric security matters more than ever.
-
While overall ransomware attack numbers remained steady, higher education institutions drove a sharp rise in exposed records, fueled in part by third-party software vulnerabilities.
-
To guard against phishing-based ransomware attacks, the state is outfitting 161 of its jurisdictions and other public-sector organizations with hardware-based protection. And it's not alone.
More Stories
-
"The security of our customers' credit card information has been increased, and our employees have gained greater control over turnaround time"
-
This project focuses on allowing data from existing systems within practices, hospitals, pharmacies and others to interconnect and transmit data across sites"
-
Information that leads to the recovery of a laptop computer and external hard drive that contained personal information for millions of veterans
-
Urges vets to place fraud alert on their credit report
-
An independent review of issues encountered during Tuesday's primary elections
-
Information Commissioner calls for prison sentences for those caught selling personal information
-
Opponents argue on privacy grounds that the law essentially creates a national identification card and as such violates their civil liberties
-
"This episode reminds us that avoiding serious data breaches means taking the practical steps necessary to cover all the bases." -- ITAA Vice President Greg Garcia
-
Appoints Jody Pettit to serve as health information technology coordinator
-
"Businesses, individuals and public administrations in Europe still underestimate the risks of insufficiently protecting networks and information"
-
Gartner analysts said IT administrators who do not manage and protect public IM will experience 80 percent more IM-related security incidents than those that do
-
As enterprises increasingly are using wireless devices to create and transmit new data and to access the most sensitive information sitting on their corporate servers, the risks are much greater, the stakes are much higher, and the potential loss is much more catastrophic
-
Secretary of state calls for special session to appropriate $6 million necessary to implement law
-
Stronger state laws regarding sexually violent predators, ID theft, and mortgage fraud
-
While 87 percent of consumers polled feel confident they can recognize a fake e-mail or Web site, 61 percent could not identify a legitimate e-mail
-
State human services agencies implement a reporting dashboard that gauges case workload performance.
-
Hummingbird employee has lost a piece of computer equipment containing names and social security numbers of a portion of TG's customer base
-
"No personally identifiable information other than names and Social Security numbers were included on the piece of equipment."
Most Read