Cybersecurity
-
At least three states have taken action following the cyber attack, which exposed sensitive personal and medical information. Hackers accessed a company network during a nearly three-month period.
-
Federal lawmakers reactivated the State and Local Cybersecurity Grant Program earlier this month — but the Department of Homeland Security, which oversees it, is in partial shutdown.
-
The city currently cannot process some online credit card payments, because of a cyber attack on one of its payment gateway providers. Officials are working to stand up a secure alternative solution.
More Stories
-
Shows how new machines work, answers questions of elections officials
-
Poll reveals continued insecurity caused by Rootkits
-
"No credit union ... would ever send an email like this asking its members for personal information"
-
Revolutionary Hybrid Supercomputer to have speed of 1000 trillion calculations per second
-
"To fight identity theft, law enforcement, business and consumers must work together"
-
"The only reason to leave information on microfilm is if you want to be certain that no one ever looks at it! It's ridiculous, but clearly that's the intention here"
-
Local governments joining the IDABC project will be able to issue digital certificates to internal users working across multiple locations or to people externally
-
Trustworthy preventative technology or political slippery slope?
-
Government agencies, ISPs, small financial institutions targeted
-
-
iBackups' owner made over $5 million, will serve 87 months in prison
-
"Lack of U.S. leadership undermines U.S. companies who must contend with censors, regulators and secret police in other nations"
-
Independent survey of nearly 300 U.S. smart phone users shows concern about risks
-
One third of respondents suffered security incidents due to business partners
-
Mock election again shows betrayal of Benedict Arnold
-
Ensure that technology is used not only to transform public services, but also to protect the individual
-
"LSU is making great strides in securing its information technology infrastructure and data repositories"
-
The Cyber Storm exercise was designed to test communications, policies and procedures in response to various cyber attacks and to identify where further planning and process improvements are needed
Most Read
- Ohio Communities Grapple With Data Center Approval Decisions
- Why a Connecticut Town Voted to Turn Off License Plate Readers
- ‘Part of Your Arm’: Students Say Tech Prohibitions Miss the Point
- Bright Spots Remain Amid Drop in Electric Truck Deployments
- Wyoming CIO Jeff Clines Is Upgrading Processes and Trust