Cybersecurity
-
The National Association of State Chief Information Officers’ list reflects pressure on states to manage cyber risk, modernize systems and implement AI responsibly — with federal partnership playing a central role.
-
Following an internal audit by the city technology office, leaders said they have removed an unknown account that had gained access to confidential legal files. An IT analysis is underway.
-
Attorney General Dana Nessel is renewing her call for Michigan to pass a law requiring companies to immediately report data breaches to her office, which would allow for quickly alerting the public.
More Stories
-
The Colorado-based research, training and education center could make the state a hub for cybersecurity activities.
-
The regulation was proposed Sept. 13 and is subject to a 45-day notice and public comment period before its final issuance. As long as it makes it through that process, the proposal will go into effect Sunday, Jan. 1.
-
Gov. Dannel P. Malloy appointed Arthur H. House to the role. House has been serving as the chairman of the Public Utilities Regulatory Authority, where he has been heavily involved in combating digital threats to the critical utilities of electricity, natural gas and water.
-
The same tech creating a future of autonomous vehicles could also make cars even more vulnerable to hacking than they already are — and they’re more vulnerable now than most drivers realize.
-
Located in Fresno, the initiative will assist local law enforcement with investigations where digital expertise or assistance is required.
-
It often takes a data breach for lawmakers to pass significant legislation around cybersecurity.
-
Legislators who take the time to study cybersecurity issues and ask tough questions of CIOs and CISOs are still the exception rather than the rule. But that may be changing.
-
Security is not an add-on and should be thought of as a foundation; all technology should be made secure.
-
A recent report details 13 steps necessary to ensure companies creating well-secured Internet of Things devices — steps that, when followed, will also protect government-procured devices from being exposed to breaches.
-
The Cyber Range will train students to fight digital intruders, and is part of a broad and growing effort nationwide to train workers to deal with cybersecurity problems.
-
Hacks and breaches pose more of a risk to national security than ever before, but a top Obama adviser says deterrence measures are in place.
-
The goal of the "Meet the Threat" initiative is to best position all states and territories to meet the cyberthreat.
-
Secretary of State Wayne Williams says that each Colorado county's in-house computers for processing and counting their voters' ballots are decentralized and are not connected to other counties' systems via the internet — and that they therefore cannot be hacked by outsiders.
-
Adm. Michael Rogers, director of the National Security Agency, said the agency doesn't do that, and “no court would ever grant us the authority to do that."
-
In the past 12 months, ransomware has reached a new level of maturity and menace, according to a special report published by Symantec.
-
While offsetting the cost of a data breach is the most common coverage for cyberinsurance, policies may cover physical cyber-risks as well, such as the danger of attacks on utilities and medical facilities, and property damage and injury from cyberattacks.
-
There are an estimated 23 billion Internet-connected devices in homes and offices worldwide, and many have little or no security shield.
-
The nation’s next president could help strike a balance between privacy and the government’s need for data. Here's how the two candidates match up.
Most Read
- Avon Lake, Ohio, Schools to End Take-Home Chromebooks
- UND, Astronaut Scholarship Foundation Open STEM Doors for Students
- Independence, Mo., to Reopen Old Power Plant for AI Data Center
- Michigan Community Works on Data Center Rules After Meta Withdraws
- Student Hackathon Winners Predict Great Lakes Ice Buildup