IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.
JulePattison-GordonNov2021.jpg

Jule Pattison-Gordon

Senior Staff Writer

Jule Pattison-Gordon is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner and hold a B.A. in creative writing from Carnegie Mellon. She’s based outside Boston.

After a ransomware attack recently caused major issues for medical providers as well as their patients, lawmakers are looking for policy moves that can protect against a repeat.
At an event held by the Institute for Security and Technology, experts discussed why simply arresting ransomware developers isn’t enough to effectively combat this cybersecurity problem.
There are six university-led, federally funded projects, and they focus on training specialists and developing defense tools to protect against attacks aimed at hobbling the country’s energy sector.
A recent cyber attack on the state court system underscored the need to boost government defenses. The bill would also bring more consolidation to executive branch IT operations.
A new report looks at three major counter-ransomware collaborations between the public and private sectors, offering up a list of challenges along with some best practices.
CISA has published a draft of a new set of federal rules that require critical infrastructure entities to report cybersecurity incidents and ransomware payments, opening it up to comments.
In the face of concerns like AI-powered phishing, tensions around discussing misinformation and physical threats, election workers can turn to several organizations aimed at providing them with help.
Cyber criminals are likely to soon target file transfer services, try to compromise the software supply chain and launch novel phishing strategies, according to a new report from Recorded Future.
In the midst of an election year, evolving AI has in part led to a massive spike in deepfake-powered disinformation, but at a recent Brookings event, experts discussed how lawmakers and officials can play defense.
This type of attack involves using face-swapped videos to try to trick online verification systems, but as they rise in prevalence, so too do methods for combating them.