Cybersecurity
-
Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
-
Some school district IT teams have been experimenting with using generative AI tools for cybersecurity, for example to analyze data logs on help desk tickets to improve incident response plans, or to troubleshoot code.
More Stories
-
Fifty-three percent of adult Internet users say they have searched online for family and friends, romantic interests or business colleagues.
-
"To put it in every-day terms, the tools needed to compromise an accurate vote count could be as simple as tampering with the paper audit trail connector or using a magnet and a personal digital assistant."
-
DHS hopes Ill. will amend statute which forbids Illinois employers from enrolling in DHS's E-Verify system.
-
"If I'm too lenient in determining what passes then I risk having the state taken to court by activists groups who will ask for an injunction on the use of electronic voting machines for the 2008 election, and if I exceed the requirements of state law and the court order, then I will be sued by the vendors who manufacture and sell the equipment."
-
-
Personal information, including Social Security numbers, not appropriately secured.
-
$3.2 billion lost to phishing attacks, according to survey.
-
Infected machines' browsers read ads from a rouge server.
-
Brief examines the challenges facing state homeland security directors and highlights the results of an annual survey of the 56 state, D.C. and territorial homeland security directors
-
Enables organizations to identify assets, ensure compliance to usage policies, as well as ensure that the most comprehensive and accurate information is collected.
-
-
Consumers, government agencies, educational and medical facilities and businesses all need to handle personal information with the greatest care to prevent ID theft.
-
Need to update criminal laws to provide law enforcement with much-needed tools to find and prosecute cyber criminals.
-
Data protection laws lay down strict conditions for the use of personal data and there is no evidence that Santa Claus has an adequate compliance program in place.
-
Scams we keep falling for, scammers paying their dues and other Cyber Security Issues in this special edition of Government Technology's Security E-Newsletter.
-
"Legal instruments may ... be required to guarantee that the technical solutions to minimize the risks for data protection and privacy are in place."
-
-
Governor Rell proposes restrictions on personal information available through online directory assistance.
Most Read
- Signal Priority Improves the Bus Ride in San Jose, Calif.
- High School Tech Director Advises Ed-Tech Skepticism, Intentionality
- Mississippi AI Innovation Hub’s New Chatbot Targets Procurement
- Cleveland Looks to Accela Permit Tech to Boost Development
- Texas Could Pass Virginia as World’s Top Data Center Market