Cybersecurity
-
Jennifer Pittman-Leeper is GovRAMP’s new field CISO, which is an advisory role. Meanwhile, the nonprofit organization has now added North Carolina to the states that it provides cybersecurity guidance.
-
A Chicago-area elementary school technology director recently spoke about the most vulnerable spots in school districts, the rising use of deepfakes, and the growing sophistication of email phishing attempts.
-
Internet services are still down at City Hall and other departments nearly a week after officials uncovered the attempted incident. Residents are unlikely to notice significant disruptions, officials said.
More Stories
-
Cybersquatting is the use of a domain name for a Web site that rightfully belongs to someone else.
-
More than $164 million will be distributed to state unemployment insurance departments for improvements to IT, cyber-security and system modernization.
-
Don't make 'bear shaving' your security policy for Web 2.0.
-
The new authority will allow the Department of Homeland Security to staff up to 1,000 positions over the next three years.
-
Malicious code comes hard and fast, so it helps to take some extra precautions when securing your network.
-
Citizen involvement in cyber-security is crucial.
-
Many Web surfers still depend on simplistic passwords.
-
Difficulty in preventing cyber-attacks on critical civilian and military computer networks means the U.S. must focus on defending these networks, according to a new RAND Corp. study.
-
A list was recently released of the most spammed states in the nation.
-
Former White House cyber-security director appointed senior adviser at Kennedy School's Belfer Center.
-
A new type subject line for an old virus, this new method has people opening malicious messages.
-
People have personal stakes in cyber-security in a world with more sophisticated and pervasive attacks.
-
Homeland Security secretary tells viewers in a live webcast that securing cyber-space is everyone's job.
-
In a recent webinar, Takai talked about transparency, underserved areas of the state and protecting information online.
-
Categories include business continuity, portals, information security and cross-boundary collaboration.
-
Phoenix police officer alleged that notes kept by his supervisor had been backdated.
-
Governments must still protect domains, critical infrastructure and Web 2.0 platforms.
-
If not resolved, the next step is referral to the European Court of Justice.
Most Read