Cybersecurity
-
Assistant CISO Seema Patel is taking over that top tech job. Godsey accepted the appointment in 2019 and has won praise for his efforts to boost cybersecurity for the fourth-largest county in the U.S.
-
Cybersecurity is around-the-clock work, but panelists at the Southern Florida Digital Government Summit offered several ideas for keeping operations secure. Generative artificial intelligence, one official said, is moving humans away from operations.
-
Montgomery County’s Information and Technology Solutions Department thwarted attempts of cyber attacks from other countries during the 2024 general election, a Montgomery County election board official reports.
More Stories
-
The Houston Housing Authority was the victim of a ransomware attack on Sept. 22, the agency said in a press release, declining to comment on what info was being held or how much was being demanded.
-
The director of the sector’s ISAC spoke recently about ransomware and other threats. Plus, a tabletop exercise revealed ways to improve public and private response to a major attack on the sector.
-
The director of the federal Cybersecurity and Infrastructure Security Agency cautioned Monday this election cycle has seen an “unprecedented amount” of false information. That includes content from foreign adversaries designed to undermine the nation’s democracy.
-
ISC2 just released their 2024 cyber workforce report, and the key findings are eye-opening for public-sector employees. Here’s what you need to know.
-
As ransomware and other cyber attacks hit the health-care sector, organizations need to follow stronger security guidance, panelists said during a recent webinar.
-
Significant cyber events from the year, like the CrowdStrike incident, tell us which critical infrastructure sectors are most at risk. What are governments doing to prepare for the new year?
-
A global study finds almost half of government cybersecurity professionals expect generative AI to end the need for certain cyber skills or cyber roles.
-
County Council members have unanimously approved a contract with Verinext to offer managed service on top of existing security protocols. The action follows the recommendation of an audit last year to upgrade the cybersecurity network. A federal grant may pay roughly half the cost.
-
The review plans to look into the workings of the China-backed hacking collective Salt Typhoon, which has penetrated U.S. telecom networks, wiretap request systems and candidates for president.
-
A new report from Auburn University’s McCrary Institute for Cyber and Critical Infrastructure Security provides recommendations for the incoming presidential administration. Here are some report highlights.
-
New Hampshire has turned to security assessments plus a set of “Drinking Water Cybersecurity in a Box” turnkey solutions to reach a good baseline defense for its water systems.
-
SponsoredStateRAMP lays groundwork for standardizing cloud security controls
-
In a move to enhance cybersecurity and digital services statewide, the Indiana Office of Technology is offering no-cost websites to all local governments, using its purchasing power with Tyler Technologies.
-
Higher education is uniquely vulnerable to cybersecurity attacks, presenters at one EDUCAUSE Annual Conference session said, and institutions should work together to address their vulnerabilities. Training and awareness are vital.
-
The Massachusetts-based program supports upskilling candidates to fill the state's workforce expertise needs, doing so via non-academic degree training programs that offer hands-on experience.
-
Sara Snell started her career as an elementary school teacher. Here is her journey to becoming a state government cyber professional.
-
Puerto Rico faces earthquakes, hurricanes and tsunamis. North Carolina was hard-hit by Hurricane Helene. Through it all, government needs to keep critical digital services running. Here’s how they do it.
-
Officials at the Municipal Authority of Westmoreland County said the entity, a water and sewer utility, recovered more than $826,000 stolen in a “vendor impersonator” phishing scheme. This, an expert said, is a rare occurrence.