Cybersecurity
-
Chief Privacy Officer Martha Wewer reviewed the state’s approach to data protection, AI oversight and consumer privacy on Thursday as Gov. Josh Stein marked a new day of awareness during Data Privacy Week.
-
There was a record set for data breaches in 2025, and the incidents were also paired with fewer details in notification letters, raising concerns about transparency and public understanding.
-
Following a turbulent year in cybersecurity, the state Governor’s Technology Office is seeking to hire a new cybersecurity lead to manage risk and compliance. Nevada’s permanent CISO retired in May 2025.
More Stories
-
Illinois Sen. Dick Durbin demanded that EMVCo, the group that sets standards for the chip technology, explain its governance and decision-making in light of the snags that EMV cards have run into.
-
The recent squabble between the FBI and Apple goes far beyond the San Bernardino Shooter's iPhone. Here is a quick overview to understand the big picture.
-
With the increase in identity theft, credit agencies are usually offering a year of free credit monitoring that will alert a user if there is suspicious activity -- but won't prevent it.
-
In Louisiana, the East Baton Rouge Parish district attorney has hopes of getting access to the FBI's technique to open the locked iPhone of slain Baton Rouge mother Brittney Mills.
-
If a computer search would qualify for a warrant if its whereabouts were known, why should simply hiding its location make it legally unsearchable?
-
The best you can do, some say, is make it tough enough that potential hackers will prod at the defenses of someone else.
-
According to information from a former technical director for the National Security Agency, the agency may be a far more significant player in patching the fraying digital fabric that secures our lives than has previously been understood.
-
The Department of Technology is among a number of agencies this year that have asked the Legislature to authorize more spending for cybersecurity in the aftermath of an auditor’s report.
-
The Florida Department of Law Enforcement said David Levin illegally gained internal access to websites of the state Division of Elections exposing several security flaws.
-
The poor-to-failing cybersecurity grades across all federal agencies illustrates that this administration has long ignored the obvious signs that cyberdefense is a priority, not an afterthought.
-
We are deepening our understanding of why people fall victim to the attacks in the first place.
-
On April 25, an attack launched against the Lansing Board of Water and Light proved just how vulnerable organizations can be to this ballooning threat vector.
-
Breaches of confidential information are inevitable. But we can limit their size and scope, and therefore their damage.
-
Cities and counties are attractive targets in part because they’re connected to state systems or other large networks.
-
The Central Illinois Center of Excellence for Secure Software seeks to train programmers to write software less vulnerable to cyberattacks.
-
New Jersey is perhaps best known for the “Parkway” and former presidential hopeful Gov. Chris Christie. But some might argue that it should be getting attention for its novel fusion center approach to cybersecurity.
-
Imagining possible futures can help us plan a secure information technology environment for the years to come.
-
Because it doesn't have the technical details, the FBI can't submit any software weaknesses to an interagency White House process that weighs whether such defects should be disclosed to manufacturers, like Apple, or developers.