Cybersecurity
-
Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
-
Some school district IT teams have been experimenting with using generative AI tools for cybersecurity, for example to analyze data logs on help desk tickets to improve incident response plans, or to troubleshoot code.
More Stories
-
Penalties could include monetary damages up to $10,000 per violation; a refund of all money paid by a county to the voting system manufacturer; decertification of the voting system in question; and prohibition of the manufacturer from doing any elections-related business in the state for up to three years.
-
"It's imperative that we localize the important messages of our national campaign to empower individuals, increase awareness about online safety and security risks at the micro level and affect grassroots change we hope will lead to a much larger shift in thinking."
-
Rogue consumer technology is crippling the enterprise.
-
-
All of the conference presentations are available for review and download from NASCIO's Web site.
-
Clark School of Engineering issues guidelines for fending off wireless 'parasites,' or harm from unauthorized access points.
-
Despite claims made in e-mails circulating on the Internet, consumers should not be concerned that their cell phone numbers will be released to telemarketers in the near future.
-
The two men used a variety of tricks to try and hide their whereabouts from the authorities, such as logging in remotely to servers in Amsterdam.
-
Security company aims to protect customers from botnet-generated data compromise by training security professionals at key government, education and industry events.
-
"One of the more interesting paradoxes, particularly for San Diego and other regions struggling to divine "smart growth" solutions, is that the more we live and work in cyberspace, the more important real place becomes."
-
"Based on his legal experience and his long record of public service, I am confident Paul will build on our administration's achievements in ensuring state government is open and transparent."
-
"As long as our children use the Internet, there will unfortunately be predators who seek to exploit them."
-
Posting photos and creating social networking profiles increases stranger contact rates.
-
"Social networking sites, popular among young people, have quickly gained members and appeal, but also act as a magnet for those who would prey on the young ... Our agreement with Facebook offers a new model of cooperative action that balances the freedom offered by the Internet with the necessary protections for children traveling on the information superhighway."
-
"RFID technology is not in and of itself the issue. RFID is a minor miracle, with all sorts of good uses ... But we cannot and should not condone forced 'tagging' of humans. It's the ultimate invasion of privacy."
-
"The Identity Theft Enforcement and Restitution Act will give federal prosecutors the tools they need to combat identity theft."
-
Thirty-six states pass, 14 fail, 21 earn higher grades in nationwide study.
-
Center for Ethical Identity Assurance initiatives include the development of a draft Consumer Bill of Rights to protect personal information and safeguard against identity fraud.
Most Read
- Signal Priority Improves the Bus Ride in San Jose, Calif.
- High School Tech Director Advises Ed-Tech Skepticism, Intentionality
- Mississippi AI Innovation Hub’s New Chatbot Targets Procurement
- Cleveland Looks to Accela Permit Tech to Boost Development
- Texas Could Pass Virginia as World’s Top Data Center Market