Cybersecurity
-
Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
-
Some school district IT teams have been experimenting with using generative AI tools for cybersecurity, for example to analyze data logs on help desk tickets to improve incident response plans, or to troubleshoot code.
More Stories
-
Terry Childs was jailed in 2008 after he refused to disclose passwords for the city's FiberWAN network, locking the city and co-workers out for 12 days.
-
Cell phones could replace hotel room keys
-
Research from TechAmerica Foundation shows California continues to lead states in most technology sectors.
-
Public officials also uncomfortable with social media use, according to global security think tank.
-
Move would encourage participation, Northern Arizona University officials say, but students say it smells of Big Brother.
-
Survey of federal IT workers finds that many of them don't adhere to file transfer policies or know that such protocols exist.
-
South America and Central America are perilous because they lead the world in the proportion of malicious to benign Web servers.
-
Four-star Army general Keith Alexander appointed to tackle cyber-warfare.
-
Draft proposal would set ground rules for the proper identification of political campaigns' social media sites.
-
University of Calgary computer scientists develop 'Typhoid' adware to study how malicious content can be stopped proactively.
-
Houston Transit Authority zeros in on network problems faster with new tool that tracks activity.
-
Like the standardized nature of e-mail, information security tools and services can be rationalized into the enterprise to provide much more consistent security while decreasing costs and the overall security footprint.
-
Online campaign ID rule would bring clarity to voters, help filter fake accounts.
-
Smart meters' tracking of energy use sparks privacy issues.
-
Governments could unintentionally release data to identity thieves if proper measures for software disposal aren't taken.
-
Open source offers global support and tested security, but requires due diligence.
-
Organizations need practical application of fundamental project management principles.
-
Mark Weatherford hopes California will unveil statewide IT security policy refresh by the end of the year.
Most Read
- Signal Priority Improves the Bus Ride in San Jose, Calif.
- High School Tech Director Advises Ed-Tech Skepticism, Intentionality
- Mississippi AI Innovation Hub’s New Chatbot Targets Procurement
- Cleveland Looks to Accela Permit Tech to Boost Development
- Texas Could Pass Virginia as World’s Top Data Center Market