Cybersecurity
-
Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
-
Some school district IT teams have been experimenting with using generative AI tools for cybersecurity, for example to analyze data logs on help desk tickets to improve incident response plans, or to troubleshoot code.
More Stories
-
While manufacturers must still install the Green Dam software on computer hard drives or have it available on installation CDs, consumers are not required to use it.
-
The U.S. Department of Homeland Security says it's working to streamline the grant process and fund projects that have staying power beyond a single grant cycle.
-
Cyber-security experts make consensus audit guidelines of security controls.
-
Practice "appears to have exceeded that which is acceptable to our community."
-
Keeping track of passwords can be overwhelming, but who really wants to explore the alternative?
-
Economic stimulus money will fund smart meters and sensors to replace U.S. legacy electric system.
-
Latest release of popular Web browser may wreak havoc with content written for earlier versions of Internet Explorer.
-
"Many states have made substantial efforts and investments to encrypt the data on mobile devices and to further protect them through use of strong policies, physical controls and end-user education.
-
-
Expert panel at government symposium parses the benefits, challenges of cloud computing.
-
Los Angeles could replace its e-mail and records systems with Google products that rely on cloud computing.
-
This marks the first time in almost three years that new voting equipment has been available for purchase and use by Ohio's 88 county boards of elections.
-
Proponents say constant peer review creates more secure applications.
-
"OMB recognizes there are appropriate uses of file sharing technologies, but as with all technology it must be appropriately managed."
-
Senior cyber-security aide to the Obama administration resigns after years of service.
-
Web 2.0 requires public sector to consider security policies.
-
"Our state CIOs deal continuously with current and emerging threats and are dedicated to IT security. It is important that this be seen as a national issue."
-
Denial-of-service attack spurs discussion about microblogging's role in the public sector.
Most Read
- Signal Priority Improves the Bus Ride in San Jose, Calif.
- High School Tech Director Advises Ed-Tech Skepticism, Intentionality
- Mississippi AI Innovation Hub’s New Chatbot Targets Procurement
- Cleveland Looks to Accela Permit Tech to Boost Development
- Texas Could Pass Virginia as World’s Top Data Center Market