Cybersecurity
-
The incident, described as an “attempted interruption,” prompted staffers to work manually, and led to the cancellation of a City Council meeting. Water, sewer and tax payments are also disrupted.
-
The move places the state among a growing group of governments using the shared authorization framework to reduce duplicative vendor security assessments. GovRAMP evolved from StateRAMP last year.
-
A faux-phishing email crafted by students at Eminence High School in Kentucky snagged 14 staffers at the district. Another in late January, created with help from generative AI, persuaded 29 staffers to click the link.
More Stories
-
"Most identity theft measures are aimed at punishing criminals or helping victims recover. A credit freeze can stop ID theft before it happens."
-
"People should exercise caution when they receive unsolicited e-mail or e-mail from senders they don't know. They should avoid opening any attachments or clicking on any links until they can verify the e-mail's legitimacy."
-
"This training was an opportunity for law enforcement to learn about how digital evidence is created and can be found. This was a great first step in providing law enforcement with training so that it can take advantage of the latest technologies to prevent and investigate a broad range of crimes."
-
"This task force will be instrumental in identifying problematic trends in the industry and working towards solutions that will hold the industry and its players responsible for their practices and provide remedies for our citizens."
-
Three examples of programs and solutions states have implemented to improve cyber security.
-
"Today people don't get their information from just one source. They might listen to the radio on their way to work, grab a newspaper at the office, watch the evening news, and logon to Facebook at night. We must adapt to their changing needs."
-
"Garland's Municipal Court's paperless operation is a success story that deserves national attention."
-
"This new research shows the latest trends about the harm resulting from data breaches and how criminals are actually using the data."
-
AirDefense has five patents granted and twenty-two pending patents.
-
The ultimate goal is the same as envisioned by the builders of the great Library at Alexandria, completed by the Macedonian rulers of Egypt around 300 BC: Archiving the world's knowledge in printed form.
-
Pandemics are unique in that they affect an organization's workforce as opposed to its physical infrastructure and therefore require a radically different approach for recovery efforts,"NASCIO looks at pandemic planning for IT disaster recovery and business continuity.
-
Now he faces up to 60 years in jail, $1.75 million fine.
-
Verdasys collaborates with Broadcom to design and develop the Linux offering to meet demanding real-world requirements.
-
As RFID becomes more prevalent in society, how can the government reduce the public's uncertainties about this mystifying technology?
-
Fifty-four percent of computer users admitted using someone else's wireless Internet access without permission.
-
"Exploring the benefit and use of new technologies allows us to identify effective solutions for addressing Denver's graffiti problem."
-
Would "foster an increase in the transparency of government and the re-democratization of governing processes to include all Americans."
-
"The fact that as many as half of employees have experienced that heart-stopping moment when they realize that their message is hurtling towards the wrong person shows that the human error factor is too significant to ignore."