Cybersecurity
-
The county sheriff’s office has identified a “person of interest” as it investigates the incident, which led to an initial loss of $3.3 million. A payment of $1.2 million has been “recovered and restored.”
-
CIO Shawnzia Thomas decodes why "cyber discipline" drives AI, modernization, and trust in Georgia’s 2026 tech agenda, and how cyber resilience is achievable through digital literacy and upskilling.
-
Officials from the state Department of Accounting and General Services warned residents that bad actors are “creating deceptive web addresses” to trick them into releasing personal information.
More Stories
-
Speakers at the recent Micromobility World conference debated the future of smart city tech and whether it’s actually been improving urban mobility, or simply facilitating a growth of the surveillance state.
-
The breach of third-party software used by the Washington Auditor’s Office could have exposed more than 1.4 million personal records, raising concerns about identity theft and fraud.
-
The bipartisan proposal would require tech companies to obtain explicit permission to collect and sell personal data of citizens. The legislation is similar to proposals underway in other parts of the country.
-
As it works across more than 100 offices and agencies to prevent, detect, respond and recover from cyberthreats, the New York City Cyber Command wants help building a zero trust digital infrastructure.
-
The proposal out of the Senate is the latest in a string of efforts to limit the use of the technology in Utah. Allegation of misuse first surfaced in 2019, kicking off a long-running conversation about guardrails.
-
The state auditor’s office issued a statement saying that one of its software vendors had been breached in December and that the system was likely accessed by an “unauthorized user.”
-
Anderson University has named Karl Perman, a U.S. Army veteran with a background in law enforcement and corporate security, as the first executive director of its new Center for Security Studies and Cyber Defense.
-
On Tuesday, Harris County Commissioners approved the purchase of $54 million in voting machines that have digital touchscreens and produce paper backups.
-
The University of Texas at San Antonio is working with elementary school educators to nurture an early interest in cybersecurity, starting with a simple card game.
-
DeRusha, a cybersecurity official on Joe Biden’s presidential campaign and the former cybersecurity chief for the state of Michigan, has been appointed federal chief information security officer.
-
Haywood County Schools began the process of notifying employees their data may have been breached by a cybercriminal ring that hacked the school's servers in August.
-
A controversial aerial surveillance proposal aimed at curbing violent crime narrowly received approval from the city’s alderman last week. Opponents called the program an invasion of privacy.
-
Critics argue the technology from Clearview AI treads on basic privacy and civil rights by collecting and storing data on individuals pulled from social media and Internet channels without their knowledge or consent.
-
Excellus BlueCross BlueShield has agreed to a settlement after it was determined the insurer may not have done enough to prevent hackers from obtaining private information about more than 9.3 million people.
-
After a malware attack over the holidays disrupted the computer-aided dispatch system and other parts of the sheriff's department operations, officials are refocusing on system security.
-
A proposal that would allow a privately funded company to provide the city with aerial surveillance services was adjusted at the request of Mayor Lyda Krewson, signalling a possible willingness to sign the bill.
-
The 35-year-old executive has been acting CISO in the California Department of Technology for two years before his official appointment was announced late Tuesday afternoon.
-
After laptops were stolen during a riot at the U.S. Capitol Jan. 6, state capitols across the nation are preparing themselves for the possibility of cyberattacks.