Cybersecurity
-
Specifically, Vermont is now paying for a statewide membership program, which extends cybersecurity support to the municipalities and other public-sector organizations within its borders.
-
The extent of the data breach is still unclear, and city officials have said they are investigating to find out what was taken, who was responsible and how the city’s cybersecurity was compromised.
-
The FBI’s annual Internet Crime Report shows that emerging technologies are shaping cyber theft, with digital fraud and related losses reaching new highs in 2025, topping more than $21 billion forfeited.
More Stories
-
Flock’s Nova platform for law enforcement reportedly used data gained from breaches. In response, the gov tech supplier is defending its product evaluation process and says it won’t use information from the dark web.
-
Duke Energy has settled a class-action lawsuit over a data breach last year which exposed personal information to cyber criminals, according to court documents filed in U.S. District Court.
-
Free public Wi-Fi hosted by cities is booming, boosting digital access. But as reliance grows, so do cybersecurity risks like "evil twin" attacks. Can cities truly make free Wi-Fi safe?
-
Officials in the central Pennsylvania county have sent a warning to residents that their information could have been put at risk by a “data privacy event.” They are probing an incident potentially involving civil court data.
-
Flock Safety, a license plate reading tech firm that recently bought a drone company, is taking heat over the data sources for its new platform. It’s not the only law enforcement technology attracting concern.
-
What is the current situation with nation-state cyber attacks in the middle of 2025? Here’s a look at some of the biggest cyber threats from Russia, China, Iran and North Korea.
-
The new information security leader, previously part of its technology organization, was formerly with Dallas, where he helped stand up that city’s first-ever cyber fusion and security operation center.
-
The latest in a series of text message schemes, this one messages residents’ cellphones seeking information. The state’s Department of Motor Vehicles commissioner said the agency does not ask for personal data over the phone.
-
Microsoft, the U.S. Justice Department, Europol and Japan’s Cybercrime Control Center are targeting the Lumma Stealer malware in an international operation. A court order has empowered the group to start taking it down.
-
Government Technology analysis of IC3 data reveals which states lead in government imposter scam reports. Are governments leveraging technology enough to protect citizens from digital impersonation?
-
The scam uses AI-generated text and voice messages to establish rapport with potential victims as a means to gaining access to personal information, often sending the victim a link to click.
-
Following a ransom attack in late March that prompted the county to take systems including Wi-Fi, jail databases and court records offline for days, the local government will transition to a .gov website in early June.
-
Administrative systems at the county 911 center were impacted by a cybersecurity incident, though radio communications and certain dispatch functions were unaffected. Officials are taking steps to contain the issue.
-
What’s on the minds of top local government chief information security officers? In this interview, Michael Dent shares current security and technology priorities, career tips and more.
-
Rodgers, a longtime officer in the U.S. Navy, has considerable technology experience in the private sector, including as a federal and public security architect at IBM. He is the former deputy mayor for Boca Raton, Fla.
-
The district attorney’s office in Fort Bend County is investigating the Feb. 24 breach of the county’s library system, which led to $2.6 million in contracts with cybersecurity companies. Some library systems are still down.
-
The state Office of Information Technology reported the breach, which is affecting systems across the state. Some state employee usernames and passwords were compromised in the incident, uncovered Friday night.
-
Most governments struggle with replacing legacy systems for a variety of reasons. But some people claim legacy mainframes can be just as secure as modern ones. So how big is the legacy cyber threat?
Most Read
- Virtual Learning Boomed, but Now States Struggle to Govern It
- Yuma County, Ariz.’s New CIO Hails From the City of Yuma
- Funding California IT Like Other Types of Infrastructure
- Is there a bike bell that you can hear even with noise-canceling headphones?
- Casper, Wyo., Will Use AI to Analyze Police Bodycam Footage