Cybersecurity
-
How can we describe the past year in cybersecurity? No doubt, AI was front and center in so many conversations, and now there’s no going back. Here’s why.
-
The document emphasizes governance, risk assessment and safety principles to protect operational technology as AI adoption grows. Understanding security concerns during development is one recommendation.
-
The renewal of a state grant program for local public agencies focuses on cybersecurity and other areas that involve gov tech. Officials encourage governments to partner on projects that could receive funding.
More Stories
-
Artificial intelligence may have been the topic on many minds this year, but cybersecurity and risk management topped NASCIO’s annual list of the top 10 priorities for state CIOs. AI did, however, rise to second place this year.
-
The incident Dec. 1 downed computer and most phone systems at two hospitals in southeast Los Angeles County, and one in Los Angeles. Urgent care centers, doctors’ offices, and a home health and hospice agency were also compromised.
-
A so-called “man-in-the-middle” cyber attack last month compromised the city’s transfer of nearly half a million dollars to pay for excavation during a water infrastructure replacement project. The FBI is among agencies investigating.
-
John Toney, the state’s chief information security officer, has been appointed a visiting fellow by the National Security Institute. Through this position, he will learn from cyber execs, building his knowledge to better serve Vermonters.
-
As we wrap up 2024, two new reports suggest that Europe and leading African nations share many of the same cyber threats and potential cybersecurity solutions as their U.S. counterparts.
-
White Lake Township was “a victim of a sophisticated cybersecurity attack,” its police chief said. The incident has compromised a portion of $29 million in infrastructure bond funds. Federal authorities and local police are investigating.
-
An expert offers insights on how government agencies, frequent targets online, can safeguard critical infrastructure and future-proof their cybersecurity. Also under consideration: artificial intelligence’s dual role in security.
-
According to city of Odessa officials, state-provided software meant to enhance cybersecurity effectively protected city systems, and staff is now restoring operations using secure backups.
-
An unprecedented cyber attack, nicknamed Salt Typhoon by Microsoft, has potentially exposed private communications to foreign hackers, with officials saying China has targeted major telecom companies.
-
The National Institute of Standards and Technology has released an updated edition of a publication that covers running a program to measure cybersecurity performance, and choosing what to measure.
-
The state is broadening a cybersecurity vulnerability assessment program to include water and wastewater utilities. Officials aim to do at least 342 tailored security examinations by 2026 to help local governments.
-
The president-elect is expected to take a predominantly deregulatory approach to technology, and to aggressively pursue foreign cyber threat actors. He returns to office in a time of international tension in cyber space.
-
Jason Balderama, a county technology official, has started working as a consultant for the housing authority to coordinate the investigation and advise on how to strengthen its Internet defenses.
-
The Cybersecurity and Infrastructure Security Agency is launching CISA Learning, a new learning management platform to help with cybersecurity training and much more.
-
SponsoredGovernment technology solutions and services should empower state and local agencies to strengthen the communities they serve.
-
GEICO and Travelers, the national insurance companies, will pay the penalties for poor data security. A 2020 cyber attack that leaked data from more than 120,000 New York customers enabled hackers to use that information to file fraudulent unemployment claims.
-
Denver appointed a new chief information security officer, Merlin Namuth, in October. He is building relationships as the foundation for a people-centered approach to cybersecurity in the city and county.
-
Has your smartphone become a listening device? Are your apps gleaning information from your conversations? How can you check and what can you do to regain more privacy? Let’s explore.