Cybersecurity
-
Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
-
Some school district IT teams have been experimenting with using generative AI tools for cybersecurity, for example to analyze data logs on help desk tickets to improve incident response plans, or to troubleshoot code.
More Stories
-
"MP3 spam is a natural progression from PDF and Excel spam whereby spammers are exploiting a new file format to be able to send spam. This is their latest attempt to evade anti-spam filters."
-
In April, Wisconsin began enforcing a new law to prohibit illegal immigrants from getting driver's licenses, but several longtime legal residents ran into unexpected hurdles to keeping their driving privileges under the rules.
-
Phishers often use the correct Web address as the name of the link but code the link to take you to the bogus address.
-
"IT executives are taking a fresh, hard look at their disaster recovery and business continuity strategies."
-
"If you visit the site and give it your personal information the chances are that you will be bombarded with unwanted junk e-mail until hell freezes over."
-
An expert's advice for those in charge of databases, and the private information they contain.
-
"Governor Spitzer's plan to give drivers licenses to illegal aliens has incensed New Yorkers in every part of the state and every political party because they see the threat it would pose to public safety and security."
-
The annual value of international physical trade in counterfeited consumer goods in 2007 totaled an estimated $200 billion, an amount equivalent to 2 percent of world trade and higher than the GDP of 150 countries.
-
"We will be incorporating all of these security standards into our past, present and future interoperability specifications."
-
"Should an Internet or network disruption take place, it is essential that we have effective and well-coordinated processes in place."
-
The NASCIO Member told congressional subcommittee: "should an Internet or network disruption take place, it is essential that we have effective and well-coordinated processes in place to ensure successful and rapid restoration of critical IT systems and applications as well as the Internet."
-
"Deploying video cameras as part of our overall crime-fighting strategy is a great example of using modern technology to enhance public safety and improve services to our citizens."
-
Guide outlines a top-level process for building and implementing a technically sound and effective information security program within an organization.
-
Includes the CIO's Top 10 List, technology issues, the promise of XML, the necessary link to enterprise architecture, and managing digital assets.
-
"While the Internet has opened a wonderful world of opportunities and information, it also can be dangerous. The safety of our children is paramount and it is important for state officials, community leaders ... to come together to provide parents with the best possible information on how to protect their children."
-
-
Photo identification is not required when voting by mail.
-
"For security reasons we cannot tell you how many cameras we'll be purchasing, or exactly where we'll be installing them, but rest assured the money will go a very long way in making our riders even safer than they are today."
Most Read
- Signal Priority Improves the Bus Ride in San Jose, Calif.
- High School Tech Director Advises Ed-Tech Skepticism, Intentionality
- Mississippi AI Innovation Hub’s New Chatbot Targets Procurement
- Cleveland Looks to Accela Permit Tech to Boost Development
- Texas Could Pass Virginia as World’s Top Data Center Market