Cybersecurity
-
Jennifer Pittman-Leeper is GovRAMP’s new field CISO, which is an advisory role. Meanwhile, the nonprofit organization has now added North Carolina to the states that it provides cybersecurity guidance.
-
A Chicago-area elementary school technology director recently spoke about the most vulnerable spots in school districts, the rising use of deepfakes, and the growing sophistication of email phishing attempts.
-
Internet services are still down at City Hall and other departments nearly a week after officials uncovered the attempted incident. Residents are unlikely to notice significant disruptions, officials said.
More Stories
-
Obama's technology leaders order real-time data for security monitoring to replace paper-based reports.
-
Poll of 1,000 18- to 24-year-olds found that at least half of them are willing to sacrifice security when it comes to file-sharing, social networking and online shopping.
-
Government employees access their laptops with the same keycards used for opening doors in Honolulu.
-
Terry Childs was jailed in 2008 after he refused to disclose passwords for the city's FiberWAN network, locking the city and co-workers out for 12 days.
-
Cell phones could replace hotel room keys
-
Research from TechAmerica Foundation shows California continues to lead states in most technology sectors.
-
Public officials also uncomfortable with social media use, according to global security think tank.
-
Move would encourage participation, Northern Arizona University officials say, but students say it smells of Big Brother.
-
Survey of federal IT workers finds that many of them don't adhere to file transfer policies or know that such protocols exist.
-
South America and Central America are perilous because they lead the world in the proportion of malicious to benign Web servers.
-
Four-star Army general Keith Alexander appointed to tackle cyber-warfare.
-
Draft proposal would set ground rules for the proper identification of political campaigns' social media sites.
-
University of Calgary computer scientists develop 'Typhoid' adware to study how malicious content can be stopped proactively.
-
Houston Transit Authority zeros in on network problems faster with new tool that tracks activity.
-
Like the standardized nature of e-mail, information security tools and services can be rationalized into the enterprise to provide much more consistent security while decreasing costs and the overall security footprint.
-
Online campaign ID rule would bring clarity to voters, help filter fake accounts.
-
Smart meters' tracking of energy use sparks privacy issues.
-
Governments could unintentionally release data to identity thieves if proper measures for software disposal aren't taken.
Most Read