Cybersecurity
-
Government security leaders are struggling. Cyber investments are lagging. Resources are being cut. The problem is getting worse. Let’s explore solutions.
-
Flock Safety cameras have become an increasingly utilized tool for the bigger police departments across the state, from urban areas like Aurora, Colorado Springs and Denver to suburbs like Douglas County.
-
Minnesota’s case is one of several breaches of late involving legitimate access, a recurring issue in provider-heavy government health and human services systems.
More Stories
-
The last four digits of about 216,000 Linn County voters’ Social Security numbers were released accidentally by staff last year in the Auditor’s Office.
-
On Aug. 7, Gov. Bruce Rauner signed legislation, which he called a welcome display of "bipartisanship," aimed at educating end users and strengthening the state's first line of defense against cyberattacks.
-
The power grid, oil and gas, and even existing telecoms are perfect targets for funding and development of these technologies.
-
All it takes is one person to click one bad link in one of those messages to wreak havoc on the entire IU network.
-
The chips will allow employees to make purchases in the company’s break room market, open doors, login to computers, use copy machines, among other things.
-
The National Governors Association has been focused on engaging states when it comes to cybersecurity, and now a multistate compact stands as another positive sign of progress.
-
An effective approach requires integrating proactive, agile defenses deeply into organizations.
-
The tool will be Internet-based, allowing it to be accessed anywhere in the world.
-
Confidence in the system’s invulnerability is eroding after national security officials revealed that during the 2016 presidential race, Russian hackers attempted to infiltrate elections systems in 21 states.
-
Cancellations rose in 38 counties across Florida from June 27 to July 17.
-
Michigan’s volunteer cybersecurity team can be deployed only in massive cyber emergencies. A bill in the Legislature would broaden its reach to smaller-scale security breaches.
-
The February 2016 attack was contained in a matter of hours and IT staff's all-nighter restored the system by the next morning.
-
The report cites "irregularities that increase the potential for voter fraud, such as improper voter registration addresses, erroneous voter roll birthdates, and the lack of definitive identification required to vote."
-
Cybersecurity say most local governments face great barriers to protecting their data and systems, including lack of funding, shortage of cybersecurity professionals and general ignorance about the seriousness of the threat.
-
Because the traditional approach of scanning data for malware has become less effective given the widespread use of encryption, Observable’s software enhances security by monitoring all devices attached to a network.
-
There is worry it could give small countries and terrorists the long-range strike capability of a superpower, the ability to crash our cyber systems and create a channel for fake news that would overwhelm our understanding of what’s real and what’s not.
-
The agency disputes a news outlet’s report as “categorically false,” adding that an analysis describing the attack was made public in a June letter to Congress.
-
With public software increasingly less vulnerable, bad actors are utilizing legitimate tools already on users' systems — and so-called 'fileless' attack techniques that leave no trace.
Most Read