Cybersecurity
-
A Chicago-area elementary school technology director recently spoke about the most vulnerable spots in school districts, the rising use of deepfakes, and the growing sophistication of email phishing attempts.
-
Internet services are still down at City Hall and other departments nearly a week after officials uncovered the attempted incident. Residents are unlikely to notice significant disruptions, officials said.
-
Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.
More Stories
-
More than 160,000 current and former Berkeley and Mills College student health records may have been compromised due to a data breach.
-
Government data security breaches include e-mail, Web site attachments.
-
While manufacturers must still install the Green Dam software on computer hard drives or have it available on installation CDs, consumers are not required to use it.
-
The U.S. Department of Homeland Security says it's working to streamline the grant process and fund projects that have staying power beyond a single grant cycle.
-
Cyber-security experts make consensus audit guidelines of security controls.
-
Practice "appears to have exceeded that which is acceptable to our community."
-
Keeping track of passwords can be overwhelming, but who really wants to explore the alternative?
-
Economic stimulus money will fund smart meters and sensors to replace U.S. legacy electric system.
-
Latest release of popular Web browser may wreak havoc with content written for earlier versions of Internet Explorer.
-
"Many states have made substantial efforts and investments to encrypt the data on mobile devices and to further protect them through use of strong policies, physical controls and end-user education.
-
-
Expert panel at government symposium parses the benefits, challenges of cloud computing.
-
Los Angeles could replace its e-mail and records systems with Google products that rely on cloud computing.
-
This marks the first time in almost three years that new voting equipment has been available for purchase and use by Ohio's 88 county boards of elections.
-
Proponents say constant peer review creates more secure applications.
-
"OMB recognizes there are appropriate uses of file sharing technologies, but as with all technology it must be appropriately managed."
-
Senior cyber-security aide to the Obama administration resigns after years of service.
-
Web 2.0 requires public sector to consider security policies.