Cybersecurity
-
State lawmakers are ramping up data center pursuit a year after passing controversial legislation aimed at drawing data centers to West Virginia at the expense of local government control and funding.
-
An ambulance billing company has agreed to pay Connecticut and Massachusetts $515,000 for a 2022 data breach that exposed private information of nearly 350,000 residents, officials said.
-
The nonprofit advisory group GovRAMP reports that its Progressing Security Snapshot Program leads to steady cybersecurity improvements for cloud service providers who sell to government, ultimately boosting trust.
More Stories
-
In Louisiana, the East Baton Rouge Parish district attorney has hopes of getting access to the FBI's technique to open the locked iPhone of slain Baton Rouge mother Brittney Mills.
-
If a computer search would qualify for a warrant if its whereabouts were known, why should simply hiding its location make it legally unsearchable?
-
The best you can do, some say, is make it tough enough that potential hackers will prod at the defenses of someone else.
-
According to information from a former technical director for the National Security Agency, the agency may be a far more significant player in patching the fraying digital fabric that secures our lives than has previously been understood.
-
The Department of Technology is among a number of agencies this year that have asked the Legislature to authorize more spending for cybersecurity in the aftermath of an auditor’s report.
-
The Florida Department of Law Enforcement said David Levin illegally gained internal access to websites of the state Division of Elections exposing several security flaws.
-
The poor-to-failing cybersecurity grades across all federal agencies illustrates that this administration has long ignored the obvious signs that cyberdefense is a priority, not an afterthought.
-
We are deepening our understanding of why people fall victim to the attacks in the first place.
-
On April 25, an attack launched against the Lansing Board of Water and Light proved just how vulnerable organizations can be to this ballooning threat vector.
-
Breaches of confidential information are inevitable. But we can limit their size and scope, and therefore their damage.
-
Cities and counties are attractive targets in part because they’re connected to state systems or other large networks.
-
The Central Illinois Center of Excellence for Secure Software seeks to train programmers to write software less vulnerable to cyberattacks.
-
New Jersey is perhaps best known for the “Parkway” and former presidential hopeful Gov. Chris Christie. But some might argue that it should be getting attention for its novel fusion center approach to cybersecurity.
-
Imagining possible futures can help us plan a secure information technology environment for the years to come.
-
Because it doesn't have the technical details, the FBI can't submit any software weaknesses to an interagency White House process that weighs whether such defects should be disclosed to manufacturers, like Apple, or developers.
-
Researchers have found that hackers can break into users accounts, track the users in real time, issue instructions and provide an inaccurate picture of traffic at any given time.
-
In a recent congressional hearing, Bruce Sewell, Apple’s general counsel, said his company wanted to sit down with the FBI once the legal decks were cleared.
-
The dark web, commonly used for drug trafficking, prostitution or child pornography, is difficult for police to access because it requires specific software, configurations or authorization.
Most Read
- Carnegie Mellon Launches Nationwide AI Resource for College Students
- $10M Federal Grant Expands Online Literacy Tool in Iowa, Wyoming
- With Private Investment, Fiber Broadband Deployment Is Rising
- AI Learning Hub Lets Governments Explore Solutions Securely
- Michigan Appoints Acting Director of Technology Department