LIVINGSTON, NJ — Following the arrest of 18-year-old John Coulouris—who yesterday was accused of being involved in the recent cyber threats against Livingston High School and charged accordingly—Mayor Al Anthony, Police Chief Craig Handschuch and Livingston Public Schools individually thanked the local law enforcement, district staff and the community at large for their effort and patience throughout this ongoing investigation. (It should […]

by

By Nicholas Gerbis, Arizona Science Desk Rising cyberattacks threaten everything from medical records to critical infrastructure. Now a lab at Arizona State University is spotting hacker activity before cyberattacks occur. The time to fix a security flaw is before it’s exploited — just ask the Clinton campaign or the World Anti-Doping Agency. So ASU’s Paulo […]

by

By Nicholas Gerbis, Arizona Science Desk Rising cyberattacks threaten everything from medical records to critical infrastructure. Now a lab at Arizona State University is spotting hacker activity before cyberattacks occur. The time to fix a security flaw is before it’s exploited — just ask the Clinton campaign or the World Anti-Doping Agency. So ASU’s Paulo […]

by

Noelle Knell Editor Government Technology editor Noelle Knell has more than 15 years of writing and editing experience, covering public projects, transportation, business and technology. A California native, she has worked in both state and local government, and is a graduate of the University of California, Davis, with majors in political science and American history. […]

by

PALOS HILLS, IL — Moraine Valley Community College and Chicago State University are partnering up to offer cybersecurity and intelligence (CSI) training thanks to a $500,000 grant from the National Science Foundation. Both schools will be able to expand their academic programs to train students for jobs to combat hackers and cyber attacks in the […]

by

NSA leaker Edward Snowden speaks via video link / AP BY: Bill Gertz Follow @BillGertz September 20, 2016 5:00 am Security officials today use the politically correct term “insider threat” to describe what were once called traitors, and no one was more aggressive in pursuing them than counterintelligence types at the National Security Agency. Thus […]

by

Cyber security and privacy protections are among key safety considerations makers of self-driving cars will be required to meet under a recently published US government policy. Download this free guide Your exclusive guide to CIO trends A collection of our most popular articles for IT leaders from the first few months of 2016, including: – […]

by

As the threat landscape grows, there’s a need to take a proactive approach that incorporates multilayered security, advanced analytics and user education. Today, no word strikes greater fear in the heart of a business or IT executive than “cyber–security.” As threats become more common and dangerous—and high-profile breaches emerge as the new normal—there’s a growing […]

by