Cybersecurity
-
Federal lawmakers reactivated the State and Local Cybersecurity Grant Program earlier this month — but the Department of Homeland Security, which oversees it, is in partial shutdown.
-
The city currently cannot process some online credit card payments, because of a cyber attack on one of its payment gateway providers. Officials are working to stand up a secure alternative solution.
-
From compromised TVs to AI-powered house chores, exploring the evolving global threats and why human-centric security matters more than ever.
More Stories
-
"These arrests are a stark reminder for parents whose children use social networking sites."
-
"When we first began to install them, many people were skeptical. But, the community began to see their worth as they effectively dispersed wrongdoers who knew their activities were being recorded."
-
"The best solution is to ensure that as little information as possible is removed from state offices. But on those occasions when we must take information on the road to perform state business, this encryption program will make sure that no unauthorized person will be able to access it or use it."
-
"It may be an effective way of waltzing past some spam defenses by hiding under YouTube's overcoat, but chances are that most people will simply erase the message in their inbox and not visit the site."
-
Seventy-nine percent of Britons continue to throw away their identities.
-
"The most effective ways to become more secure while reducing security spending are to avoid vulnerabilities -- to ensure that security is a top requirement for every new application, process or product."
-
"The criminals are offering the pet puppy in an attempt to gather information from kind-hearted people who jump in to help."
-
"Biometric technology is transforming the way we protect our borders ... New fingerprint visas are fast becoming our first line of defense against illegal immigration. By establishing people's identities beyond any doubt before they enter the U.K. we can stamp out multiple applications and identity fraud."
-
"It's concerning how many companies are unaware of non-compliant machines being used on their network, even though they may be permanently connected."
-
"No enterprise can be completely free of IT risk. Like any other risk, IT risk is something to be managed, not eliminated."
-
When the potential impact of shutting down all the ca.gov Web sites was realized, the issue quickly elevated, and about 2 p.m., the state activated the Emergency Operations Center.
-
"It's imperative that we localize the important messages of our national campaign to empower individuals, increase awareness about online safety and security risks at the micro level and affect grassroots change we hope will lead to a much larger shift in thinking."
-
Penalties could include monetary damages up to $10,000 per violation; a refund of all money paid by a county to the voting system manufacturer; decertification of the voting system in question; and prohibition of the manufacturer from doing any elections-related business in the state for up to three years.
-
Rogue consumer technology is crippling the enterprise.
-
-
All of the conference presentations are available for review and download from NASCIO's Web site.
-
Clark School of Engineering issues guidelines for fending off wireless 'parasites,' or harm from unauthorized access points.
-
Despite claims made in e-mails circulating on the Internet, consumers should not be concerned that their cell phone numbers will be released to telemarketers in the near future.
Most Read
- Modernizing a 100-Year-Old Government Process in the Age of AI
- Remote Learning Still a Work in Progress at Buffalo Schools
- Tracking Human Heart Rate Without a Wearable Device
- Burke County Schools See Positive Impacts From Less Screen Time
- $150M in Federal Disaster Preparedness Funds for Wash. in Limbo