-
As a new federal administration prepares to assume control, the GovAI Coalition Summit showed the local promise of artificial intelligence, from solutions available to the leaders ready to make them work.
-
While cybersecurity remains a high priority for many CIOs, we spoke to technology leaders to understand what other skills are difficult to find when recruiting new talent.
-
In addition to upskilling and transforming their workforce, IT leaders in government are investing in enterprise technology that can scale for the future.
More Stories
-
By utilizing stolen credentials and engaging in spearphishing, hackers backed by Russia have been able to infiltrate U.S. defense contractors of various sizes and swipe "sensitive" data.
-
Multifactor authentication is a key part of zero-trust security, and a method promoted by the likes of CISA. It aims to block out hackers who — in this age of data breaches — manage to steal users’ passwords.
-
A Florida bill would allow gas stations to be more competitive in the electric vehicle charging market by making it illegal for investor-owned utilities to pass the cost of EV charging infrastructure to their customers.
-
Maryland's Democratic lawmakers are pushing to revise and clarify public records laws in an attempt to retrieve Gov. Larry Hogan's text messages with staff that were automatically deleted with an app.
-
Adopting a zero-trust approach has helped the courts secure remote and hybrid operations and limit how much damage a potential hacker could wreak, says New Jersey Judiciary CIO Jack McCarthy.
-
The efforts to extend language translation capabilities across all state websites that offer public services and COVID-19 information could be given more time by the state Legislature through a recent amendment.
-
The Identity Theft Resource Center's 2021 annual report shows a 68 percent increase in data compromises compared to 2020. The report also says ransomware may soon supplant phishing as the dominant cyber attack.
-
One Ohio bill would allow private citizens to sue social media platforms for removing content, while another would only allow the state attorney general to file a lawsuit against a company for violating privacy.
-
According to the Washington Department of Licensing, hackers indeed stole Social Security numbers and other personal data from at least 650,000 individuals through a data breach that might have occurred late January.
-
The U.S. Cybersecurity and Infrastructure Security Agency announced plans to review the extent of the vulnerabilities detailed in a confidential report on Georgia's voting touchscreens.
-
After settling a similar Illinois lawsuit last year for $650 million, Facebook is again facing a legal challenge from a state for its use of facial recognition. This time it’s Texas that’s taking the fight to the company.
-
In this week’s episode of “In Case You Missed It,” we take a look at how state and local governments are faring in comparison to private organizations in a new highly competitive labor market.
-
Thanks to the bipartisan infrastructure bill, Pennsylvania could receive as much as $25 million in federal money to make its highways more electric vehicle-ready via the installation of strategically located chargers.
-
Elon Musk said he anticipates that, with Federal Aviation Administration approval, the SpaceX Starship will reach orbit by the end of the year from Texas. It would be the most powerful rocket to ever do so.
-
Over 3 million households across Texas lack broadband, with the situation being particularly concerning in the western and southern segments of the state and among Latino households.
-
For the duration of the pandemic in California, it has been relatively easy for scammers, even those who are operating from prison, to receive unemployment benefits under false pretenses.
-
After a poor final financial quarter in 2021, Meta Platforms, once known as simply Facebook, yesterday suffered the biggest one-day plunge in U.S. stock market history. Can Mark Zuckerberg rebound?
-
Zero trust contrasts with a “castle and moat” approach to cybersecurity thinking, and recognizes that use of remote workforces and cloud services means there’s no longer a clear perimeter to defend.