Cybersecurity
-
State lawmakers are ramping up data center pursuit a year after passing controversial legislation aimed at drawing data centers to West Virginia at the expense of local government control and funding.
-
An ambulance billing company has agreed to pay Connecticut and Massachusetts $515,000 for a 2022 data breach that exposed private information of nearly 350,000 residents, officials said.
-
The nonprofit advisory group GovRAMP reports that its Progressing Security Snapshot Program leads to steady cybersecurity improvements for cloud service providers who sell to government, ultimately boosting trust.
More Stories
-
That type of data made available by police and health departments leads to easy-to-implement solutions that work for everyone.
-
More and more, hackers are praying on local governments, hospitals and even police departments, and forcing officials to decide whether to meet the demands or risk losing their data.
-
A smaller staff and a smaller budget don’t lessen the cybersecurity burden. Here’s what leaders at the local level are doing to protect their IT environments.
-
The Colorado-based research, training and education center could make the state a hub for cybersecurity activities.
-
The regulation was proposed Sept. 13 and is subject to a 45-day notice and public comment period before its final issuance. As long as it makes it through that process, the proposal will go into effect Sunday, Jan. 1.
-
Gov. Dannel P. Malloy appointed Arthur H. House to the role. House has been serving as the chairman of the Public Utilities Regulatory Authority, where he has been heavily involved in combating digital threats to the critical utilities of electricity, natural gas and water.
-
The same tech creating a future of autonomous vehicles could also make cars even more vulnerable to hacking than they already are — and they’re more vulnerable now than most drivers realize.
-
Located in Fresno, the initiative will assist local law enforcement with investigations where digital expertise or assistance is required.
-
It often takes a data breach for lawmakers to pass significant legislation around cybersecurity.
-
Legislators who take the time to study cybersecurity issues and ask tough questions of CIOs and CISOs are still the exception rather than the rule. But that may be changing.
-
Security is not an add-on and should be thought of as a foundation; all technology should be made secure.
-
A recent report details 13 steps necessary to ensure companies creating well-secured Internet of Things devices — steps that, when followed, will also protect government-procured devices from being exposed to breaches.
-
The Cyber Range will train students to fight digital intruders, and is part of a broad and growing effort nationwide to train workers to deal with cybersecurity problems.
-
Hacks and breaches pose more of a risk to national security than ever before, but a top Obama adviser says deterrence measures are in place.
-
The goal of the "Meet the Threat" initiative is to best position all states and territories to meet the cyberthreat.
-
Secretary of State Wayne Williams says that each Colorado county's in-house computers for processing and counting their voters' ballots are decentralized and are not connected to other counties' systems via the internet — and that they therefore cannot be hacked by outsiders.
-
Adm. Michael Rogers, director of the National Security Agency, said the agency doesn't do that, and “no court would ever grant us the authority to do that."
-
In the past 12 months, ransomware has reached a new level of maturity and menace, according to a special report published by Symantec.
Most Read
- Putting Citizens First: How Franklin County Transformed Its Digital Government Experience
- Idaho Lawmakers Consider Requiring AI Guidelines for Schools
- Albertus Magnus College Gifted $3M for Immersive VR Classroom
- Carnegie Mellon Launches Nationwide AI Resource for College Students
- $10M Federal Grant Expands Online Literacy Tool in Iowa, Wyoming