Cybersecurity
-
To avoid creating vulnerabilities, school IT leaders often find themselves saying "no" to new tools and systems. Instead, they should foster a culture of innovation by convening partners to figure out how to make it work.
-
SponsoredA new wave of employment fraud is targeting U.S. companies, with fake candidates using AI-enhanced resumes and stolen identities to infiltrate organizations. Socure uncovers how these sophisticated schemes, often linked to foreign operatives, pose significant security risks and highlights the urgent need for advanced identity verification in hiring processes.
-
SponsoredAs government services move increasingly online, public-sector websites have become both vital touchpoints and vulnerable targets. This article outlines a strategic, cloud-first approach to securing the digital front door — with insights on AI, zero-trust frameworks and modern best practices.
More Stories
-
His predecessor left the job in March. Brinkley worked at the National Institute for Occupational Health and Safety, Lockheed Martin and other operations while developing his cybersecurity expertise.
-
The University of Texas at San Antonio will build a $135 million command center that will work with Regional Security Operations Centers across the state to repair weaknesses in government systems and educate users.
-
A private liberal arts college in Portland, Ore., settled a class-action lawsuit after cyber criminals stole data of employees, students and alumni in 2023, and the college didn't send notifications until a year later.
-
Officials, who recently increased their cyber insurance coverage, have refused to pay a ransom. They are working to fully replace all network infrastructure, including desktops, laptops, servers and storage.
-
In addition to patient data, cyber criminals have also stolen directly from health-care firms, including $3.6 million from an Orlando-area nonprofit that runs behavioral health services on behalf of the state.
-
Recent cyber attacks have given a new urgency to business resiliency in the public and private sectors. Let’s explore the problem and some workable answers.
-
Flock’s Nova platform for law enforcement reportedly used data gained from breaches. In response, the gov tech supplier is defending its product evaluation process and says it won’t use information from the dark web.
-
Duke Energy has settled a class-action lawsuit over a data breach last year which exposed personal information to cyber criminals, according to court documents filed in U.S. District Court.
-
Free public Wi-Fi hosted by cities is booming, boosting digital access. But as reliance grows, so do cybersecurity risks like "evil twin" attacks. Can cities truly make free Wi-Fi safe?
-
Officials in the central Pennsylvania county have sent a warning to residents that their information could have been put at risk by a “data privacy event.” They are probing an incident potentially involving civil court data.
-
Flock Safety, a license plate reading tech firm that recently bought a drone company, is taking heat over the data sources for its new platform. It’s not the only law enforcement technology attracting concern.
-
What is the current situation with nation-state cyber attacks in the middle of 2025? Here’s a look at some of the biggest cyber threats from Russia, China, Iran and North Korea.
-
The new information security leader, previously part of its technology organization, was formerly with Dallas, where he helped stand up that city’s first-ever cyber fusion and security operation center.
-
The latest in a series of text message schemes, this one messages residents’ cellphones seeking information. The state’s Department of Motor Vehicles commissioner said the agency does not ask for personal data over the phone.
-
Microsoft, the U.S. Justice Department, Europol and Japan’s Cybercrime Control Center are targeting the Lumma Stealer malware in an international operation. A court order has empowered the group to start taking it down.
-
Government Technology analysis of IC3 data reveals which states lead in government imposter scam reports. Are governments leveraging technology enough to protect citizens from digital impersonation?
-
The scam uses AI-generated text and voice messages to establish rapport with potential victims as a means to gaining access to personal information, often sending the victim a link to click.
-
Following a ransom attack in late March that prompted the county to take systems including Wi-Fi, jail databases and court records offline for days, the local government will transition to a .gov website in early June.
Most Read
- Maryland Universities Team With Google for AI, Tech Certificates
- North Carolina School District Pivots Back to Pen and Paper
- Colo. Water Rescue Team Trains in 'Most Difficult Conditions'
- Fayette Schools May Adopt Tablet System for Bus Drivers
- As Regulation Ban Looms, California Issues Frontier AI Study