Cybersecurity
-
The nonprofit advisory group GovRAMP reports that its Progressing Security Snapshot Program leads to steady cybersecurity improvements for cloud service providers who sell to government, ultimately boosting trust.
-
The National Association of State Chief Information Officers’ list reflects pressure on states to manage cyber risk, modernize systems and implement AI responsibly — with federal partnership playing a central role.
-
Following an internal audit by the city technology office, leaders said they have removed an unknown account that had gained access to confidential legal files. An IT analysis is underway.
More Stories
-
Georgia CIO Calvin Rhodes and Washington state CISO Agnes Kirk weigh in on how to garner support for a cybersecurity strategy that protects against today's threats.
-
Allison recently discussed how agencies manage and coordinate in the face of evolving threat vectors.
-
What can we learn from the tragic global events of the past 10 days? The use of social media is front and center in tracking online and offline crimes, especially terrorist activity. How can we prepare for tomorrow?
-
"There will be a cyberattack on our utilities," said the chairman of the state Public Utilities Regulatory Authority.
-
A proposed addition to the Orange County, Calif., Sheriff’s Department would investigate Internet fraud, data hacks, online bullying and child porn.
-
Private personal information of potentially thousands of people was unintentionally available on public computers in the Sutter County Superior Courthouse.
-
Hackers can exploit information stored in emails after they gain access to an account.
-
State chief information security officers have to get creative to make sure their cybersecurity workforce is ready for today's threats.
-
Following one of the largest data breaches on record, the Office of Personnel Management hires a chief information security officer.
-
After city officials were notified about the lack of security on a parking website, security measures were added to help protect citizens' information.
-
In Utah, officials are looking to the future — when employees, businesses and the general public have seamless and secure access to the systems they need, and nothing more.
-
The new rules require that agencies put in place public policies regarding the use of any surveillance technology before it is acquired, and issue annual reports on how the technologies have been used and what they discovered.
-
Several states are looking into technology that would block cellular signals and make contraband phones useless to inmates.
-
As urban centers expand their reliance on automated sensors and algorithms, they increase risks of data security breaches, vulnerabilities to invasions of privacy and concerns about software reliability.
-
The UC Berkeley Center for Long-Term Cybersecurity is exploring potential widespread threats to Internet security bigger than just isolated hacks.
-
'All of our shared drive files have been encrypted with software typically used in ransomware attacks,' said spokesman Andrew LaMar.
-
SixThirty Cyber plans to invest $10 million in cybersecurity startups over the next five years.
-
The state Legislature passed three bills all concerned with protecting state data and computer systems.
Most Read