Cybersecurity
-
Some school district IT teams have been experimenting with using generative AI tools for cybersecurity, for example to analyze data logs on helpdesk tickets to improve incident response plans, or to troubleshoot code.
-
The incident, described as an “attempted interruption,” prompted staffers to work manually, and led to the cancellation of a City Council meeting. Water, sewer and tax payments are also disrupted.
-
The move places the state among a growing group of governments using the shared authorization framework to reduce duplicative vendor security assessments. GovRAMP evolved from StateRAMP last year.
More Stories
-
Committee to address enterprise content management -- records and information management policies -- on a statewide level.
-
Sixty-three percent of Atlanta business owners are concerned about wireless data security; also among the most likely to back up data daily, and even hourly.
-
"We still mail paper cards to almost 2 million Texans on Medicaid each month. The postage alone costs us $750,000 a month."
-
Victims from around the world, believing they had won the lottery, handed over confidential and financial information to prove their identities. The confidential data taken from the victims is then used to drain bank accounts.
-
"Be mindful that criminals are actively looking for identity theft opportunities this time of the year."
-
Currently implementing agencywide smart-card logon with Personal Identification Verification (PIV) certificates; secure e-mail via standards-based encryption capabilities; digital signatures for agency forms and documents; and strong authentication solutions for Web servers and domain controllers.
-
"Help the legitimate traveler proceed more quickly while protecting their identity and enable our frontline personnel to focus even greater attention on potential security risks."-Dept. of Homeland Security Secretary Michael Chertoff
-
Plan will consolidate IT functions including management of private sector contracts and infrastructure security.
-
CyberLover malware mimics males and female to steal personal data.
-
Training program for junior high and high school personnel will demonstrate what cyberbullying is, how it happens and how educators can recognize signs and take action to thwart this practice.
-
Addressing the need to adopt new practices that protect Social Security numbers and other personal information from identity thieves and other unscrupulous viewers while maintaining records that can be used for legitimate business purposes.
-
A "roadblock" between the public and critical government information.
-
Reports says action must be taken to protect organizations from cyber attacks.
-
Bill requires sex offenders to register e-mail addresses; increases penalties for using technology to lure children.
-
Spammers increased usage of attachments, such as PDF files in 2007.
-
Hard disk containing personal information missing from "secure facility" in America.
-
Fifty-three percent of adult Internet users say they have searched online for family and friends, romantic interests or business colleagues.
-
"To put it in every-day terms, the tools needed to compromise an accurate vote count could be as simple as tampering with the paper audit trail connector or using a magnet and a personal digital assistant."
Most Read