Cybersecurity
-
From compromised TVs to AI-powered house chores, exploring the evolving global threats and why human-centric security matters more than ever.
-
While overall ransomware attack numbers remained steady, higher education institutions drove a sharp rise in exposed records, fueled in part by third-party software vulnerabilities.
-
To guard against phishing-based ransomware attacks, the state is outfitting 161 of its jurisdictions and other public-sector organizations with hardware-based protection. And it's not alone.
More Stories
-
Revolutionary Hybrid Supercomputer to have speed of 1000 trillion calculations per second
-
"To fight identity theft, law enforcement, business and consumers must work together"
-
"The only reason to leave information on microfilm is if you want to be certain that no one ever looks at it! It's ridiculous, but clearly that's the intention here"
-
Local governments joining the IDABC project will be able to issue digital certificates to internal users working across multiple locations or to people externally
-
Trustworthy preventative technology or political slippery slope?
-
Government agencies, ISPs, small financial institutions targeted
-
-
iBackups' owner made over $5 million, will serve 87 months in prison
-
"Lack of U.S. leadership undermines U.S. companies who must contend with censors, regulators and secret police in other nations"
-
Independent survey of nearly 300 U.S. smart phone users shows concern about risks
-
One third of respondents suffered security incidents due to business partners
-
Mock election again shows betrayal of Benedict Arnold
-
Ensure that technology is used not only to transform public services, but also to protect the individual
-
"LSU is making great strides in securing its information technology infrastructure and data repositories"
-
The Cyber Storm exercise was designed to test communications, policies and procedures in response to various cyber attacks and to identify where further planning and process improvements are needed
-
Cyber Storm was the largest and most complex multi-national, government-led cyber exercise to examine response, coordination, and recovery mechanisms to a simulated cyber event within international, federal, state, and local governments and in conjunction with the private sector
-
Government Gateway leverages open federation and interoperability
-
Highlighted need for a holistic government approach to cyber security
Most Read