Cybersecurity
-
At least three states have taken action following the cyber attack, which exposed sensitive personal and medical information. Hackers accessed a company network during a nearly three-month period.
-
Federal lawmakers reactivated the State and Local Cybersecurity Grant Program earlier this month — but the Department of Homeland Security, which oversees it, is in partial shutdown.
-
The city currently cannot process some online credit card payments, because of a cyber attack on one of its payment gateway providers. Officials are working to stand up a secure alternative solution.
More Stories
-
Three examples of programs and solutions states have implemented to improve cyber security.
-
"This task force will be instrumental in identifying problematic trends in the industry and working towards solutions that will hold the industry and its players responsible for their practices and provide remedies for our citizens."
-
"Today people don't get their information from just one source. They might listen to the radio on their way to work, grab a newspaper at the office, watch the evening news, and logon to Facebook at night. We must adapt to their changing needs."
-
"Garland's Municipal Court's paperless operation is a success story that deserves national attention."
-
"This new research shows the latest trends about the harm resulting from data breaches and how criminals are actually using the data."
-
AirDefense has five patents granted and twenty-two pending patents.
-
The ultimate goal is the same as envisioned by the builders of the great Library at Alexandria, completed by the Macedonian rulers of Egypt around 300 BC: Archiving the world's knowledge in printed form.
-
Pandemics are unique in that they affect an organization's workforce as opposed to its physical infrastructure and therefore require a radically different approach for recovery efforts,"NASCIO looks at pandemic planning for IT disaster recovery and business continuity.
-
Now he faces up to 60 years in jail, $1.75 million fine.
-
Verdasys collaborates with Broadcom to design and develop the Linux offering to meet demanding real-world requirements.
-
As RFID becomes more prevalent in society, how can the government reduce the public's uncertainties about this mystifying technology?
-
Fifty-four percent of computer users admitted using someone else's wireless Internet access without permission.
-
"Exploring the benefit and use of new technologies allows us to identify effective solutions for addressing Denver's graffiti problem."
-
Would "foster an increase in the transparency of government and the re-democratization of governing processes to include all Americans."
-
"The average state gets only B- on contracts and C- on lobbying. On subsidies, the average grade is F. No state receives better than B across all categories."
-
"The fact that as many as half of employees have experienced that heart-stopping moment when they realize that their message is hurtling towards the wrong person shows that the human error factor is too significant to ignore."
-
Three judge panel ends interference action against AirTight's broad WIPS patent.
-
Confidence in Internet on the rise in U.S. and Japan, decline in Europe.
Most Read