Cybersecurity Funding Available For State And Local Government Officials
There’s been so much sensational news in the last few days, it’s very easy to overlook other important news. That can be dangerous, and here’s a good example of something we should not overlook.
Where’s The Transportation Funding To Be Found?
The collection of Toll Road Fees became such a contentious issue in Texas earlier this week that the Texas Department of Transportation announced the agency would waive $1.3 billion in late fees owed by motorists from 2007 until March 1 of 2018.
SamSam paralyzes Atlanta’s cybersecurity framework
Cyber breaches are destructive, costly and horrific incidents. Government agencies, hospitals and big retailers are primary targets because of the massive data they hold. They are especially attractive to cyber sleuths because that data is critical to ongoing operations.
Smart City Security: Atlanta Cyberattack Cripples City
Targeted ransomware virus SamSam breached Atlanta’s network servers without warning, leaving officials without access to critical records, underscoring the need for smart city security.
Protecting America’s Power Grids
AMERICA’S POWER grids have been vulnerable to physical and cyberattacks for a very long time. But now, the very frightening possibility of losing power because of a security breach is getting an abundance of attention.
Second City’s Airport Will No Longer Be Second-Rate
The signs of O’Hare’s decline were apparent, says Mary Scott Nabers, president and CEO of Strategic Partnerships, a consulting firm.
“Once one of the nation’s busiest airports, O’Hare has recently dropped to number three in airport rankings. While O’Hare is still the third largest U.S. airport with approximately 78 million passengers a year, it is no longer considered one of the best.”
Atlanta Cyberattack Sounds Alarm For Other Computer Networks
Cyber breaches are destructive, costly and horrific incidents. Government agencies, hospitals and big retailers are primary targets because of the massive data they hold. They are especially attractive to cyber sleuths because that data is critical to ongoing operations.