Cybersecurity
-
Chief Privacy Officer Martha Wewer reviewed the state’s approach to data protection, AI oversight and consumer privacy on Thursday as Gov. Josh Stein marked a new day of awareness during Data Privacy Week.
-
There was a record set for data breaches in 2025, and the incidents were also paired with fewer details in notification letters, raising concerns about transparency and public understanding.
-
Following a turbulent year in cybersecurity, the state Governor’s Technology Office is seeking to hire a new cybersecurity lead to manage risk and compliance. Nevada’s permanent CISO retired in May 2025.
More Stories
-
The stability and benefits in the public sector used to be enough to attract qualified candidates to vital positions in government, but these days, larger paychecks from private companies are luring those qualified candidates.
-
The government loses billions each year to tax refund fraud, but this summer, Georgia and North Carolina will pilot a new technology that aims to change that.
-
The new plan, called “Hack the Pentagon” is the first-ever “cyber bug bounty” program in the history of the federal government, according to the Department of Defense.
-
Although the Cupertino-based company claimed that it cannot extract data, software can be built and uploaded to the phone that would act as a kind of malware and allow a computer to guess the phone’s passcode an unlimited number of times without the risk of erasing its data.
-
FBI Director James Comey warned that encryption poses a monumental threat to public safety, as it renders court-approved search warrants generally useless.
-
Extremist groups like the Islamic State of Iraq and the Levant also are using well-produced propaganda to draw outsiders to their cause, according to a top Department of Justice official.
-
U.S. Attorney General Loretta Lynch announced a potential cooperative agreement between the United States and the British government that would provide a reciprocal framework for data sharing between both governments and private industry.
-
Apple General Counsel Bruce Sewell explained at a federal hearing why the company is ethically and constitutionally compelled not to comply with the FBI's request to create a tool that would allow access to the San Bernardino shooter’s encrypted iPhone.
-
Although details of the cyberattack are classified, officials said teams working from Ft. Meade, Md., identified and jammed Islamic State online communication networks during the four-day battle.
-
There is no single reason cybersecurity ethical standards don’t yet exist, or even a consensus that they should — let alone exactly what they might consist of or what impact they might have.
-
Cybersecurity expert Chuck Brooks talks about where we stand in what many people call the "wild, wild west" of cybersecurity.
-
Pentagon aides hope Defense Secretary Ashton Carter's outreach to the fast-paced start-up culture can help fill gaps in U.S. cyberdefense efforts, and speed up development and procurement of digital tools — from robotics to artificial intelligence — to the military.
-
The video’s text attacks the company founders for suspending Islamic State-related accounts.
-
Although there has been much more attention payed to the current struggle between the FBI and Apple, new unsealed court documents reveal that there have been dozens of other requests to unlock devices.
-
The findings, summarized in a report published this week, join a growing body of research about the vulnerabilities in medical devices and health-care systems.
-
Apple says it won't comply with a court order to unlock a terrorism suspect's iPhone for the FBI. Here's the technology at play.
-
The openness of the Internet gives an advantage to attackers – but what constitutes an act of war in the electronic world?
-
The government wants reasonable paths into phones and databases for criminal investigations, but it is instead being met with stiffer barriers.