Cybersecurity
-
A contract with Motorola Solutions will enable the county to do a better job of safeguarding its emergency radio communications system. Tower sites and radio dispatch consoles will get 24/7 security.
-
With its longtime federal support now withdrawn, one of the country’s largest public-sector cybersecurity support organizations has moved to a new paid model where states handle the bill for its services.
-
Legislation proposed by Sen. Mary Elizabeth Coleman, R-Arnold, would do away with several state boards and commissions. If it becomes law, the Missouri Cybersecurity Commission would be among them.
More Stories
-
Laurie R. Doran has been appointed to lead the New Jersey Office of Homeland Security and Preparedness, the governor announced Friday. The agency oversees counterterrorism and cybersecurity work.
-
For about two years, the Anchorage Police Department in Alaska accidentally uploaded personal information of individuals involved in traffic accidents to LexisNexis. A system malfunction caused the leaks.
-
Some experts place at least partial blame on COVID-19 for the recent onslaught of cyber attacks on public and private entities. Between May 2020 and May 2021, the FBI saw complaints about cyber crime jump by 1 million.
-
The police force of Azusa, Calif., recently experienced a ransomware attack, an event hidden from the public for months. A new investigation shows the agency also remained silent about an attack that occurred in 2018.
-
Cybersecurity leaders debated choosing the right security framework, using AI to get ahead of threats and making developers the stars of cloud-based defenses during a recent panel discussion.
-
New York Power Authority officials say they are taking steps to ensure they are protected against cyberattacks like those that occurred with Colonial Pipeline this year and SolarWinds in 2020.
-
Next month, West Virginia Chief Technology Officer Joshua Spence will be recognized as the state chief information officer. Spence said the title change represents a larger strategic vision for the state.
-
Mobile County, Ala., shut down its IT systems for three days after a malware infection last week. The county hasn't revealed which system components were affected. The federal government is looking into the attack.
-
SponsoredIn this article, we’ll walk you through the basic principles of the CJIS security policy (such as the 13 policy areas), how to best comply with these policies, and solutions for how to best address the various security requirements outlined in the policy.
-
The cashless parking app used in several U.S. cities announced that it had been breached by a cyberattack earlier this year. According to ParkMobile, no credit card information was accessed in the incident.
-
The Russia-backed hackers behind the massive SolarWinds cyberattack earlier this year are increasing their attacks against the U.S. government, according to analysis by software giant Microsoft.
-
Coming on the heels of a political scandal and a large cyber attack, Scranton’s recent move to modernize its ERP system is key to rebuilding public trust, ensuring security and bringing city operations up to date.
-
After Colonial Pipeline Co. fell victim to a disruptive ransomware attack earlier this month, the Department of Homeland Security is requiring companies in the space to report future cybersecurity incidents.
-
Clark County, Ohio, officials say that a solid majority of their IT operations have been restored following the onset of a malware attack that caused most of their servers to go down earlier this month.
-
Iowa Workforce Development is warning residents about an attempt to steal personal information through a fraudulent website that mirrors the state’s official unemployment portal.
-
The lawsuit, filed in U.S. District Court for the Northern District of Georgia May 18, alleges the company breached its duty to employ industry security standards which resulted in system outages that harmed consumers.
-
The U.S. is wary of 5G tech from China, but industry experts ask if it’s possible to guarantee software is free of components from a particular country. Plus, they ask, when something goes wrong with 5G applications’ security, who’s to blame?
-
Under a forthcoming security directive being issued by the Transportation Security Administration, pipeline operators would reportedly be required to report certain cyber attacks to the Department of Homeland Security.
Most Read