Cybersecurity
-
Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
-
Some school district IT teams have been experimenting with using generative AI tools for cybersecurity, for example to analyze data logs on help desk tickets to improve incident response plans, or to troubleshoot code.
More Stories
-
McAfee report discloses trends in smartphone threats, spam and cybercrime.
-
Cyberattacks could pave the way to war through inroads into a country's infrastructure or financial system.
-
According to one Web app security company, 99 percent of tested Web apps used by both the public- and private-sector are vulnerable.
-
Vint Cerf, the Internet's founding father, has issued a challenge for security researchers to safeguard devices connecting to the Web.
-
Security pros urge the public sector to focus on mobile access control, not mobile device lockdown.
-
A German website maps details of millions of cyberattacks around the globe.
-
Director of National Intelligence James R. Clapper Jr. warns Senate committee that a large-scale cyberattack could cause major service disruption in the next two years.
-
Protecting the president at the inauguration takes coordination and lots of law enforcement.
-
Researchers from U.C. Berkeley say brain scan authentication is reliable enough to replace traditional passwords.
-
Cybersecurity expert offers insights on the typical public sector breach victim and advice to minimize the risk of an attack.
-
This new cybersecurity threat is making inroads in the public sector by leveraging the popularity of single sign-on -- but there are ways to mitigate your exposure.
-
Report also finds that in 2012, email traffic attacks most often targeted government.
-
One expert recommends role-based monitoring to help protect public sector networks against internal and external threats.
-
Government, academic and private-sector cybersecurity experts are establishing a research agenda they hope will affect America’s developing cybersecurity approach.
-
Former DHS official's new book examines the potential damage hackers could do to infrastructure and financial systems.
-
Despite objections by civil liberty groups and White House reservations, CISPA passes in the House by a vote of 288 to 127.
-
The Verizon 2013 Data Breach Investigations Report draws from more data than ever, revealing that most data breaches are opportunistic attacks to gain a quick buck.
-
While the Haley administration says it has released all the breach-related data it can, many say the state is hiding embarrassing information.
Most Read
- Signal Priority Improves the Bus Ride in San Jose, Calif.
- High School Tech Director Advises Ed-Tech Skepticism, Intentionality
- Mississippi AI Innovation Hub’s New Chatbot Targets Procurement
- Cleveland Looks to Accela Permit Tech to Boost Development
- Texas Could Pass Virginia as World’s Top Data Center Market