cybersecurity

The Better Cybercrime Metrics Act – legislation that aims to improve cybercrime data collection and give law enforcement more tools to stop online crime – was approved this week by the Senate via unanimous consent, and by the House Judiciary Committee via voice vote.

A recent market study from TeamDynamix found that 78 percent of organizations surveyed listed resource constraints as one of their top challenges. If you’re familiar with ITSM (IT service management), it’s no surprise that many organizations find self-service and Knowledge-Centered Service (KCS®) to be effective strategies to mitigate this challenge. And while both self-service and KCS are sound tools for ITSM, there are other strategies you should consider adding to build out a true 360 platform.

cyberattack, privacy

The Broward County Public School (BCPS) District is in the process of notifying about 50,000 people that a ransomware attack earlier this year resulted in unauthorized access to some district systems that may have potentially included the sensitive information of some faculty staff and students.

Digital vaccine credentials and exposure notification apps can be used to safely reopen social and economic activities and allow for more rapid and broader contact tracing. However, an official from the Government Accountability Office (GAO) said the improper implementation of both technologies sparked concerns about privacy, effectiveness, interoperability, and equity that may limit their use and potential public health benefits.

The National Institute of Standards and Technology (NIST) is looking for information on the trends and future investment needs for eight emerging technology sectors to complete a study authorized in the fiscal year (FY) 2021 appropriations act, according to a request for information (RFI) posted to the Federal Register.

1 39 40 41 42 43 50