Cybersecurity
-
Michael Toland, Oklahoma’s chief information security officer, will exit the position and officials have embarked upon a search for his replacement. State CIO Dan Cronin will oversee cybersecurity in the interim.
-
The cybersecurity incident detected Wednesday prompted officials to shutter most county systems. The attack hit the local government’s network. Fire and emergency 911 resources were able to continue to operate.
-
To avoid creating vulnerabilities, school IT leaders often find themselves saying "no" to new tools and systems. Instead, they should foster a culture of innovation by convening partners to figure out how to make it work.
More Stories
-
Gov. Greg Abbott has signed a bill formally creating the Texas Cyber Command at the University of Texas at San Antonio. The bill also calls for creating a digital forensics lab and a cyber threat intelligence center.
-
Among its requirements, the sixth statewide election security directive from Secretary of State Frank LaRose calls for monthly cybersecurity checklists for county election boards, and audits by the state’s cybersecurity team.
-
His predecessor left the job in March. Brinkley worked at the National Institute for Occupational Health and Safety, Lockheed Martin and other operations while developing his cybersecurity expertise.
-
The University of Texas at San Antonio will build a $135 million command center that will work with Regional Security Operations Centers across the state to repair weaknesses in government systems and educate users.
-
A private liberal arts college in Portland, Ore., settled a class-action lawsuit after cyber criminals stole data of employees, students and alumni in 2023, and the college didn't send notifications until a year later.
-
Officials, who recently increased their cyber insurance coverage, have refused to pay a ransom. They are working to fully replace all network infrastructure, including desktops, laptops, servers and storage.
-
In addition to patient data, cyber criminals have also stolen directly from health-care firms, including $3.6 million from an Orlando-area nonprofit that runs behavioral health services on behalf of the state.
-
Recent cyber attacks have given a new urgency to business resiliency in the public and private sectors. Let’s explore the problem and some workable answers.
-
Flock’s Nova platform for law enforcement reportedly used data gained from breaches. In response, the gov tech supplier is defending its product evaluation process and says it won’t use information from the dark web.
-
Duke Energy has settled a class-action lawsuit over a data breach last year which exposed personal information to cyber criminals, according to court documents filed in U.S. District Court.
-
Free public Wi-Fi hosted by cities is booming, boosting digital access. But as reliance grows, so do cybersecurity risks like "evil twin" attacks. Can cities truly make free Wi-Fi safe?
-
Officials in the central Pennsylvania county have sent a warning to residents that their information could have been put at risk by a “data privacy event.” They are probing an incident potentially involving civil court data.
-
Flock Safety, a license plate reading tech firm that recently bought a drone company, is taking heat over the data sources for its new platform. It’s not the only law enforcement technology attracting concern.
-
What is the current situation with nation-state cyber attacks in the middle of 2025? Here’s a look at some of the biggest cyber threats from Russia, China, Iran and North Korea.
-
The new information security leader, previously part of its technology organization, was formerly with Dallas, where he helped stand up that city’s first-ever cyber fusion and security operation center.
-
The latest in a series of text message schemes, this one messages residents’ cellphones seeking information. The state’s Department of Motor Vehicles commissioner said the agency does not ask for personal data over the phone.
-
Microsoft, the U.S. Justice Department, Europol and Japan’s Cybercrime Control Center are targeting the Lumma Stealer malware in an international operation. A court order has empowered the group to start taking it down.
-
Government Technology analysis of IC3 data reveals which states lead in government imposter scam reports. Are governments leveraging technology enough to protect citizens from digital impersonation?