Cybersecurity
-
Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
-
Some school district IT teams have been experimenting with using generative AI tools for cybersecurity, for example to analyze data logs on help desk tickets to improve incident response plans, or to troubleshoot code.
More Stories
-
"The government should not keep information confidential merely because public officials might be embarrassed by disclosure."
-
Cyber-criminals are using accounts that are likely stolen to post comments with links supposedly pointing to videos of celebrities such as Christian Bale, Megan Fox or Jessica Simpson.
-
"This white paper has been created specifically for CFOs that are weighing the potential benefits of new and emerging technology and looking for solutions that can save time, effort, resources, and, most importantly, lives."
-
"Our Privacy Office is viewed as a leader in the federal government in public outreach and as [a] model for privacy impact assessments."
-
Attorney General Abbott charges Edinburg Fitness Center with Identity Theft Prevention Act violations.
-
Harris County government telework supports continuity of operations.
-
Security, infrastructure, management and resources top federal CIO concerns.
-
"I have long stressed the importance of protecting the sensitive information that telecommunications carriers collect about their customers."
-
Two-thirds of U.S. consumers surveyed use the same one or two passwords for all Web sites.
-
Agencies must submit a report within 45 days to the Governor's General Counsel detailing what information can be posted online.
-
The Widespread Conficker worm has taken a new form and is infecting more machines.
-
"We must remain vigilant in the fight to protect our children online because child predators are constantly looking for their next victim."
-
Police officers use Blackberrys in Hawaii to access motor vehicle and criminal databases.
-
The Federal Trade Commission documented the most cases of identity theft ever in one year in the 2008 Fraud and Identity Theft Complaint Data.
-
Bowen will consider what action -- including possible withdrawal of state approval -- to take on the Premier GEMS voting system.
-
Government Technology's Top 25 public-sector innovators for 2009.
-
The requirement if enacted, would cost around $20 million to fit 10,000 voting machines with printers.
-
The U.S. Department of Homeland Security creates group for public and private-sector agencies so federal and local government can work together to reduce cyber-security holes.
Most Read
- Signal Priority Improves the Bus Ride in San Jose, Calif.
- High School Tech Director Advises Ed-Tech Skepticism, Intentionality
- Mississippi AI Innovation Hub’s New Chatbot Targets Procurement
- Cleveland Looks to Accela Permit Tech to Boost Development
- Texas Could Pass Virginia as World’s Top Data Center Market