Cybersecurity
-
The incident, described as an “attempted interruption,” prompted staffers to work manually, and led to the cancellation of a City Council meeting. Water, sewer and tax payments are also disrupted.
-
The move places the state among a growing group of governments using the shared authorization framework to reduce duplicative vendor security assessments. GovRAMP evolved from StateRAMP last year.
-
A faux-phishing email crafted by students at Eminence High School in Kentucky snagged 14 staffers at the district. Another in late January, created with help from generative AI, persuaded 29 staffers to click the link.
More Stories
-
"IT executives are taking a fresh, hard look at their disaster recovery and business continuity strategies."
-
"If you visit the site and give it your personal information the chances are that you will be bombarded with unwanted junk e-mail until hell freezes over."
-
An expert's advice for those in charge of databases, and the private information they contain.
-
"Governor Spitzer's plan to give drivers licenses to illegal aliens has incensed New Yorkers in every part of the state and every political party because they see the threat it would pose to public safety and security."
-
The annual value of international physical trade in counterfeited consumer goods in 2007 totaled an estimated $200 billion, an amount equivalent to 2 percent of world trade and higher than the GDP of 150 countries.
-
"We will be incorporating all of these security standards into our past, present and future interoperability specifications."
-
"Should an Internet or network disruption take place, it is essential that we have effective and well-coordinated processes in place."
-
The NASCIO Member told congressional subcommittee: "should an Internet or network disruption take place, it is essential that we have effective and well-coordinated processes in place to ensure successful and rapid restoration of critical IT systems and applications as well as the Internet."
-
"Deploying video cameras as part of our overall crime-fighting strategy is a great example of using modern technology to enhance public safety and improve services to our citizens."
-
Includes the CIO's Top 10 List, technology issues, the promise of XML, the necessary link to enterprise architecture, and managing digital assets.
-
Guide outlines a top-level process for building and implementing a technically sound and effective information security program within an organization.
-
"While the Internet has opened a wonderful world of opportunities and information, it also can be dangerous. The safety of our children is paramount and it is important for state officials, community leaders ... to come together to provide parents with the best possible information on how to protect their children."
-
-
Photo identification is not required when voting by mail.
-
"For security reasons we cannot tell you how many cameras we'll be purchasing, or exactly where we'll be installing them, but rest assured the money will go a very long way in making our riders even safer than they are today."
-
"The gang responsible are experts at choosing topical disguises or crafting alluring e-mails that the unwary may find difficult to resist."
-
"This Trojan exploits the vulnerability within the person sitting in front of the keyboard. It's the Mac user who is giving permission for the code to run and allowing their computer to be infected."
-
Would function much like the national "Do Not Call" list, and is intended to protect consumers from having their online activities unknowingly tracked, stored, and used by marketers and advertising networks.