Cybersecurity
-
Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
-
Some school district IT teams have been experimenting with using generative AI tools for cybersecurity, for example to analyze data logs on help desk tickets to improve incident response plans, or to troubleshoot code.
More Stories
-
While the Haley administration says it has released all the breach-related data it can, many say the state is hiding embarrassing information.
-
The new National Security Solutions Center at Virginia Tech unites private industry and academia to combat threats waged via the Internet.
-
A study by Fiberlink revealed that 68 percent of employees didn't secure the data of an old BYOD device after upgrading, despite probably having an organizational policy requiring such a measure.
-
The lack of graphical indicators in the URL field of mobile browsers presents a major security risk, according to researchers.
-
One new startup uses a person's unique cardiac signal to secure digital devices.
-
The central city of Râmnicu Vâlcea, Romania, is a major source of coordinated online crime networks, prompting action from the FBI.
-
Security firm CEO says it’s important for governments to monitor their networks diligently, but they must think smart for their efforts to be useful.
-
Stories about privacy violation, network security threats and changing malware were among the hottest cybersecurity Web items for 2012.
-
The 2012 Norton Cybercrime Report claims that 18 adults become victims of cybercrime every second.
-
Following repeated failures by the Senate to pass a new cybersecurity law to protect national infrastructure, a former White House cybersecurity chief offered the president advice.
-
Alabama's new policy to scan prison visitor fingerprints to verify identification has drawn the ire of the ACLU.
-
Some officials have expressed interest in regulating trades of software exploits, but others say it would be a futile effort.
-
A draft executive order is making its rounds and President Barack Obama will soon decide whether to complete a task that Congress has repeatedly failed.
Most Read
- Signal Priority Improves the Bus Ride in San Jose, Calif.
- High School Tech Director Advises Ed-Tech Skepticism, Intentionality
- Mississippi AI Innovation Hub’s New Chatbot Targets Procurement
- Cleveland Looks to Accela Permit Tech to Boost Development
- Texas Could Pass Virginia as World’s Top Data Center Market