Cybersecurity
-
Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
-
Some school district IT teams have been experimenting with using generative AI tools for cybersecurity, for example to analyze data logs on help desk tickets to improve incident response plans, or to troubleshoot code.
More Stories
-
New devices mean new policies for governments to enact.
-
Following repeated failures by the Senate to pass a new cybersecurity law to protect national infrastructure, a former White House cybersecurity chief offered the president advice.
-
Some officials have expressed interest in regulating trades of software exploits, but others say it would be a futile effort.
-
The 2012 Norton Cybercrime Report claims that 18 adults become victims of cybercrime every second.
-
A draft executive order is making its rounds and President Barack Obama will soon decide whether to complete a task that Congress has repeatedly failed.
-
Alabama's new policy to scan prison visitor fingerprints to verify identification has drawn the ire of the ACLU.
-
Cybersecurity audits performed by the Information Technology Department showed a "penetration test" was necessary for the county.
-
According to U.S. Sen. Bill Nelson, foreign operatives successfully breached some of Florida’s voter registration systems ahead of the 2018 midterm elections.
-
Using e-mails disguised as pay-raise notifications, a sophisticated phishing scam duped the employees into giving up their login information.
-
The state is the first to try the technology at such a large scale — though the number of people using the system will likely be a tiny fraction of the overall electorate.
-
Members of the U.S. House Energy and Commerce Committee on Monday requested more information about how iPhones and Androids are collecting data on their users.
-
Documents related to the MQ-9 Reaper drone and a list of military personnel with knowledge of the weaponized UAV were put up for sale on the dark web until cybersecurity experts stepped in.
-
How different is being a government Chief Information Security Officer from having the same role in the private sector? A CISO with experience in both worlds offers seven insights.
-
A 45-page lawsuit alleges that South Carolina's digital voting machine fleet is outdated, broken down and full of "deep security flaws" that make them vulnerable to Russian hackers.
-
The recent opening of a portion of the Georgia Cyber Innovation and Training Center has set the stage for what the state hopes will be a “cyber tsunami.”
-
On Friday, the Justice Department indicted 12 Russian officers in the Main Intelligence Directorate of the General Staff, known as the GRU, for interfering in the 2016 presidential election.
-
12 Russian intelligence agents were indicted for allegedly hacking email accounts to purposefully interfere with the 2016 election.
-
Russian government agents allegedly penetrated U.S. state and county election databases. Scholars of election security offer insight and recommendations about what to do now.
Most Read
- Signal Priority Improves the Bus Ride in San Jose, Calif.
- High School Tech Director Advises Ed-Tech Skepticism, Intentionality
- Mississippi AI Innovation Hub’s New Chatbot Targets Procurement
- Cleveland Looks to Accela Permit Tech to Boost Development
- Texas Could Pass Virginia as World’s Top Data Center Market