Cybersecurity
-
Internet services are still down at City Hall and other departments nearly a week after officials uncovered the attempted incident. Residents are unlikely to notice significant disruptions, officials said.
-
Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
More Stories
-
"Safeguarding critical [data] is not just an IT issue; it's a business continuity issue, and the opposite can cause you financial loss and an inability to serve your customers."
-
Readers respond to stories on California Secretary of State Debra Bowen and public employee salary databases.
-
"By coming together as a law enforcement community, we have the ability to tackle this rapidly growing crime head on."
-
"A high percentage of data breaches and identity thefts stem from human error -- therefore focusing on people and their behavior is a key element of any effective security program."
-
"Online auctions are great for bargains, quirky merchandise and collectibles, but you need to know what you are doing."
-
Utility computing can consolidate IT departments, but raises security questions.
-
The 10-year, $1.9 billion partnership modernizes the commonwealth's IT infrastructure, including computers, networks and e-mail, at 85 agencies to improve government services.
-
While many Americans still struggle to understand basic cyber security tools and practices, they do recognize that security is a major issue.
-
"In the ever-changing world of technology and youth online safety, the best way for Congress to protect children online is to support collaborative, comprehensive and diversified approaches to online safety education."
-
Biometric authentication also removes the possibility of passwords being inappropriately shared, forgotten or stolen.
-
-
Spammers use sex life improvement e-mails to trick users into verifying the e-mail address is valid and active.
-
Review of Maryland State Police Covert Surveillance of Anti-Death Penalty and Anti-War Groups from March 2005 to May 2006.
-
Simple but powerful encryption system will protect e-mail for more than 40 county agencies.
-
In its fifth year, premiere leadership award celebrates those leading the charge to protect the nation's critical information systems.
-
"I have a sworn duty to protect the integrity and security of our state's elections, and will fight any attempt to breach Georgians' trust in our electoral process."
-
Tagging of some 50,000 circulation items has begun, and installation is expected to be completed by the end of November.
-
The DMV will now be using facial recognition software, allowing the department to compare new photos with other photos in its database as a further guard against identity theft.