IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Jule Pattison-Gordon

Senior Staff Writer

Jule Pattison-Gordon is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner and hold a B.A. in creative writing from Carnegie Mellon. She’s based outside Boston.

Authorities are working to prepare for one by, for the first time, conducting a massive federal tabletop exercise focused on food and agriculture cybersecurity resilience.
The federal government is slated to distribute $18.2 million of Tribal Cybersecurity Grant Program funds as soon as the spring, and experts say the funds will help address important needs.
After a ransomware attack recently caused major issues for medical providers as well as their patients, lawmakers are looking for policy moves that can protect against a repeat.
At an event held by the Institute for Security and Technology, experts discussed why simply arresting ransomware developers isn’t enough to effectively combat this cybersecurity problem.
There are six university-led, federally funded projects, and they focus on training specialists and developing defense tools to protect against attacks aimed at hobbling the country’s energy sector.
A recent cyber attack on the state court system underscored the need to boost government defenses. The bill would also bring more consolidation to executive branch IT operations.
A new report looks at three major counter-ransomware collaborations between the public and private sectors, offering up a list of challenges along with some best practices.
CISA has published a draft of a new set of federal rules that require critical infrastructure entities to report cybersecurity incidents and ransomware payments, opening it up to comments.
In the face of concerns like AI-powered phishing, tensions around discussing misinformation and physical threats, election workers can turn to several organizations aimed at providing them with help.
Cyber criminals are likely to soon target file transfer services, try to compromise the software supply chain and launch novel phishing strategies, according to a new report from Recorded Future.