Cybersecurity
-
Chief Privacy Officer Martha Wewer reviewed the state’s approach to data protection, AI oversight and consumer privacy on Thursday as Gov. Josh Stein marked a new day of awareness during Data Privacy Week.
-
There was a record set for data breaches in 2025, and the incidents were also paired with fewer details in notification letters, raising concerns about transparency and public understanding.
-
Following a turbulent year in cybersecurity, the state Governor’s Technology Office is seeking to hire a new cybersecurity lead to manage risk and compliance. Nevada’s permanent CISO retired in May 2025.
More Stories
-
The incubator will take advantage of the city’s “strong cybersecurity ecosystem” to help startup companies make new products and technology for the industry.
-
The federal government’s effort to change Rule 41 has become a flash point in the clash between federal law enforcement and Silicon Valley.
-
The group said the act was executed “collectively, through a global attack.”
-
House Majority Leader Kevin McCarthy is pushing for legislation in Congress as part of a broader effort to encourage innovation in the federal government.
-
Cyber Guard 16, an annual interagency exercise, is aimed at pushing the limits of those who protect America's critical infrastructure.
-
Georgia CIO Calvin Rhodes and Washington state CISO Agnes Kirk weigh in on how to garner support for a cybersecurity strategy that protects against today's threats.
-
Allison recently discussed how agencies manage and coordinate in the face of evolving threat vectors.
-
What can we learn from the tragic global events of the past 10 days? The use of social media is front and center in tracking online and offline crimes, especially terrorist activity. How can we prepare for tomorrow?
-
"There will be a cyberattack on our utilities," said the chairman of the state Public Utilities Regulatory Authority.
-
A proposed addition to the Orange County, Calif., Sheriff’s Department would investigate Internet fraud, data hacks, online bullying and child porn.
-
Private personal information of potentially thousands of people was unintentionally available on public computers in the Sutter County Superior Courthouse.
-
Hackers can exploit information stored in emails after they gain access to an account.
-
State chief information security officers have to get creative to make sure their cybersecurity workforce is ready for today's threats.
-
Following one of the largest data breaches on record, the Office of Personnel Management hires a chief information security officer.
-
After city officials were notified about the lack of security on a parking website, security measures were added to help protect citizens' information.
-
In Utah, officials are looking to the future — when employees, businesses and the general public have seamless and secure access to the systems they need, and nothing more.
-
The new rules require that agencies put in place public policies regarding the use of any surveillance technology before it is acquired, and issue annual reports on how the technologies have been used and what they discovered.
-
Several states are looking into technology that would block cellular signals and make contraband phones useless to inmates.