Cybersecurity
-
Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
-
Some school district IT teams have been experimenting with using generative AI tools for cybersecurity, for example to analyze data logs on help desk tickets to improve incident response plans, or to troubleshoot code.
More Stories
-
One former intelligence officer told The Wall Street Journal that disclosure, if genuine, likely would disrupt or halt ongoing U.S. intelligence operations.
-
As searches of smartphones and other digital devices at U.S. borders become more common, can research and computer science help protect travelers' privacy?
-
When it comes to digital data — photos, conversations, health information or finances — nothing can be perfectly private.
-
Cybersecurity risks and antiquated technology are front and center at the Legislature this spring, where lawmakers are considering whether to spend more than $100 million to bring the state’s software into the current decade.
-
A recent data dump contained nearly 9,000 pages of purported internal CIA documents that indicated the spy agency had gained access to Android and Apple smartphones, Samsung SmartTVs and Internet-enabled cars using a variety of tools.
-
Data can help governments solve specific problems and prepare for major events.
-
When it comes to the split-second, life-or-death decisions a member of the national security apparatus faces constantly, what’s important is having a strong moral background
-
Ransomware blocks access to a computer system, making its contents inaccessible absent some form of payment -- or ransom.
-
WikiLeaks will release the code showing how the CIA managed to break into phones, work around encrypted messaging apps and avoid detection by software designed to defend against cyberattacks.
-
Trump’s allegation that President Barack Obama ordered his phones tapped last fall, a claim for which he has offered no evidence, is an indication of the sensitivities surrounding surveillance practices that do not cleave easily along party lines.
-
A ruling by the Federal Communications Commission and two joint resolutions introduced in Congress would make it harder for consumers to keep their personal information private.
-
Assemblyman Jay Obernolte is renewing Republican efforts to codify into state law Gov. Jerry Brown’s cybersecurity center.
-
While California cybersecurity officials agree that speaking out after an incident can be a disheartening experience, they also agreed that it is essential to communicating a potentially active threat and coordinating an appropriate response.
-
The GSA's Office of Inspector General found that 18F disregarded several security rules and other governmental procedures, but the states it has recently contracted with say they're not concerned about similar issues.
-
Serverless computing allows a true platform-as-a-service environment, letting developers focus on coding rather than back-end operations.
-
Two new VetSuccess Immersion Academies from the SANS Institute will augment the Cyber Vets Virginia initiative announced in November.
-
Rep. Giovanni Capriglione’s bills focus on cybercriminals and studying how to increase cybersecurity.
-
Larger drone manufacturers build their devices with software to keep them from flying into areas where presidential and other flight restrictions are in place
Most Read
- Signal Priority Improves the Bus Ride in San Jose, Calif.
- High School Tech Director Advises Ed-Tech Skepticism, Intentionality
- Mississippi AI Innovation Hub’s New Chatbot Targets Procurement
- Cleveland Looks to Accela Permit Tech to Boost Development
- Texas Could Pass Virginia as World’s Top Data Center Market