Cybersecurity
-
At least three states have taken action following the cyber attack, which exposed sensitive personal and medical information. Hackers accessed a company network during a nearly three-month period.
-
Federal lawmakers reactivated the State and Local Cybersecurity Grant Program earlier this month — but the Department of Homeland Security, which oversees it, is in partial shutdown.
-
The city currently cannot process some online credit card payments, because of a cyber attack on one of its payment gateway providers. Officials are working to stand up a secure alternative solution.
More Stories
-
United States takes top spot, again.
-
Galveston County uses iris scanning technology to identify missing children.
-
CD lost in transit held Social Security numbers, names addresses, more.
-
"It is essential not to run any file that arrives from unreliable sources."
-
"The problem with user name/password is once you get it, you're in."
-
Sites like IRS.com, IRS.net, and IRS.org are owned by for-profit companies that make money by offering services that, in many cases, taxpayers could get for free through the IRS's official Web site, IRS.gov.
-
"The constant struggle between security personnel and malware authors is an arms race -- no matter how quickly security professionals design new safeguards, the bad guys seem to make similar advances."
-
"It's troubling that some of the agencies with the most sensitive information continue to score poorly on this."
-
"While FISMA is an important first step in providing heightened information security awareness for agencies, there are not nearly enough consequences for those agencies who fail to comply."
-
CEO mocks senator over old adage.
-
"Testing protocols and electoral procedures are in place to ensure fair, accurate and accessible elections."
-
Jacksonville man used grooming techniques to luring child to his home.
-
-
The part technology plays in helping and/or hindering people with disabilities.
-
An ongoing federal crackdown against the illegal distribution of copyrighted movies, software, games and music over P2P networks employing the BitTorrent file sharing technology.
-
Hackers attack unpatched flaw in Microsoft code to penetrate servers.
-
-
"State managers and employees have a greater responsibility than ever to protect state technology resources and minimize the insider threat. It's everyone's job."
Most Read