-
Senators ask DHS for strategy to protect U.S. critical infrastructure from Russia
March 15, 2022 | News, CybersecurityThey also raised a series of questions about modern cyber and disinformation threats.
-
Election officials say safety threats may drive away poll workers
| News, Public SafetyThree out of five administrators in a new study said they worried that threats, harassment and intimidation would make it harder to recruit new workers. Officials nationwide back that up.
-
Who’s responsible if a Tesla on autopilot kills someone?
| News, Emerging TechThe electric vehicle manufacturer clearly places the onus of safety on the driver, but research suggests that humans are susceptible to automation bias, an over-reliance on automated aids and decision support systems. Ultimately, courts will decide.
-
States must expand data sources for strategic flood resilience
March 14, 2022 | News, Data & AnalyticsFailure to incorporate forward-looking climate data and demographic trends will limit states’ ability to develop effective flood mitigation plans.
-
Legacy vulnerabilities risk critical infrastructure security
| News, CybersecurityThe convergence of IT and operational technology along with the layering of third-party digital products and services over legacy systems often compounds the limited visibility and control security teams have, experts say.
-
Claim your roadkill with 511 app
| News, Public SafetyThe Wyoming Department of Transportation’s 511 app now has a feature that walks users through the process of applying to the Department of Game and Fish to claim and collect roadkill.
-
Mayors judge civic tech pitches at SXSW
| News, Emerging TechGood Call, whose 24/7 hotline provides immediate access to legal support for arrested individuals, took home a $10,000 prize and a chance to pitch at the U.S. Conference of Mayors’ annual meeting.
-
Data and the cyber workforce
| News, CybersecurityA Bureau of Cybersecurity Statistics could help government collect more granular data and metrics on the state of cyber employment.
-
Using the Sherlock Holmes method for cyber defense
| News, CybersecurityEndpoint and network detection and response solutions will give agencies the evidence they need for solving cybersecurity cases.
-
Smart devices spy on you – 2 computer scientists explain how the Internet of Things can violate your privacy
| News, Emerging TechAs internet connectivity extends to devices in offices, shopping areas, cities and homes, privacy is in more danger than ever.