Cybersecurity
-
The National Association of State Chief Information Officers’ list reflects pressure on states to manage cyber risk, modernize systems and implement AI responsibly — with federal partnership playing a central role.
-
Following an internal audit by the city technology office, leaders said they have removed an unknown account that had gained access to confidential legal files. An IT analysis is underway.
-
Attorney General Dana Nessel is renewing her call for Michigan to pass a law requiring companies to immediately report data breaches to her office, which would allow for quickly alerting the public.
More Stories
-
Agencies are broadening a few conventional tactics to prevent cyberattacks.
-
Defense attorneys and some legal scholars suggest that he FBI committed more serious crimes than those they’ve arrested.
-
FBI Director James Comey paints a guarded picture of the bureau’s war on cybercrime and its escalating battle on the encryption front.
-
The nonprofit Automotive Information Sharing and Analysis Center has developed a series of auto cybersecurity best practices that cover governance, risk management, security by design and threat detection, to name a few.
-
Speaking Tuesday at a cybersecurity conference in Washington, FBI Director James Comey appeared to draw a line between hacking for traditional espionage purposes and computer intrusions meant to influence the outcome of an election.
-
The hack in Illinois marked the first confirmation that such a breach could be executed successfully.
-
Given the state’s cyber assets, local and state officials believe New Mexico could become a hub for the cybersecurity industry.
-
The Trump app's privacy policy says that users who agree to share their contact data can rescind that consent later, however, users do not have a way to know if their data will be deleted from the campaign's servers.
-
Ransomware attacks are not new, but they are among the fastest growing forms of malware, and they increasingly target government and hospital networks.
-
The state's health information exchange is seeking the certification to ensure that clinical information is protected, but not all stakeholders feel it's worth the effort.
-
Officials and digital voting advocates say statistics, polling infrastructure and auditing laws make voter fraud highly implausible.
-
Some experts say they’re overblown. Yet the issue reflects how the Internet has become the world’s superstructure, knitting the citizenry together.
-
As we see from these cautionary tales, bolstering network security in your local or state departments cannot wait.
-
The sharing of cyberintelligence between government security agencies and non-government entities is a new frontier — another progression — in the wave of intelligence-sharing that followed the terrorist attacks of September 2001
-
Eligible travelers will be able to submit their passport information and customs declaration form to Customs and Border Patrol via an app prior to arrival, cutting down on the time spent at the airport before the flight.
-
Breaking into computer networks overseas in search of useful intelligence about foreign governments and terrorists conflicts with helping protect America's networks against foreign spies and other hackers.
-
Rep. David McKinley will take messages from a West Virginia forum to Washington, D.C., in hopes of creating funding to support cybersecurity.
-
Housed within the U.S. Department of Commerce, NIST is charged with promoting competition in the private sector while advancing innovation that serves the public.
Most Read