Cybersecurity
-
The nonprofit advisory group GovRAMP reports that its Progressing Security Snapshot Program leads to steady cybersecurity improvements for cloud service providers who sell to government, ultimately boosting trust.
-
The National Association of State Chief Information Officers’ list reflects pressure on states to manage cyber risk, modernize systems and implement AI responsibly — with federal partnership playing a central role.
-
Following an internal audit by the city technology office, leaders said they have removed an unknown account that had gained access to confidential legal files. An IT analysis is underway.
More Stories
-
The best you can do, some say, is make it tough enough that potential hackers will prod at the defenses of someone else.
-
According to information from a former technical director for the National Security Agency, the agency may be a far more significant player in patching the fraying digital fabric that secures our lives than has previously been understood.
-
The Department of Technology is among a number of agencies this year that have asked the Legislature to authorize more spending for cybersecurity in the aftermath of an auditor’s report.
-
The Florida Department of Law Enforcement said David Levin illegally gained internal access to websites of the state Division of Elections exposing several security flaws.
-
The poor-to-failing cybersecurity grades across all federal agencies illustrates that this administration has long ignored the obvious signs that cyberdefense is a priority, not an afterthought.
-
We are deepening our understanding of why people fall victim to the attacks in the first place.
-
On April 25, an attack launched against the Lansing Board of Water and Light proved just how vulnerable organizations can be to this ballooning threat vector.
-
Breaches of confidential information are inevitable. But we can limit their size and scope, and therefore their damage.
-
Cities and counties are attractive targets in part because they’re connected to state systems or other large networks.
-
The Central Illinois Center of Excellence for Secure Software seeks to train programmers to write software less vulnerable to cyberattacks.
-
New Jersey is perhaps best known for the “Parkway” and former presidential hopeful Gov. Chris Christie. But some might argue that it should be getting attention for its novel fusion center approach to cybersecurity.
-
Imagining possible futures can help us plan a secure information technology environment for the years to come.
-
Because it doesn't have the technical details, the FBI can't submit any software weaknesses to an interagency White House process that weighs whether such defects should be disclosed to manufacturers, like Apple, or developers.
-
Researchers have found that hackers can break into users accounts, track the users in real time, issue instructions and provide an inaccurate picture of traffic at any given time.
-
In a recent congressional hearing, Bruce Sewell, Apple’s general counsel, said his company wanted to sit down with the FBI once the legal decks were cleared.
-
The dark web, commonly used for drug trafficking, prostitution or child pornography, is difficult for police to access because it requires specific software, configurations or authorization.
-
Verizon’s latest worldwide report on data breaches outlines some troubling trends that have become more dangerous to our tech-centric way of life.
-
While this case appears over, more are likely to emerge, increasing calls for new legislation that clarifies whether law enforcement can seek court orders to get tech companies’ assistance in unlocking phones.
Most Read