Cybersecurity
-
Chief Privacy Officer Martha Wewer reviewed the state’s approach to data protection, AI oversight and consumer privacy on Thursday as Gov. Josh Stein marked a new day of awareness during Data Privacy Week.
-
There was a record set for data breaches in 2025, and the incidents were also paired with fewer details in notification letters, raising concerns about transparency and public understanding.
-
Following a turbulent year in cybersecurity, the state Governor’s Technology Office is seeking to hire a new cybersecurity lead to manage risk and compliance. Nevada’s permanent CISO retired in May 2025.
More Stories
-
Washington Gov. Jay Inslee recently named two new ways the state will protect its systems and the data of its citizens.
-
An online service checks users' Facebook, Twitter, Instagram and Google+ profiles for companies looking at potential employees, but the service may be used to vet potential immigrants.
-
The costs of cyberattacks have significantly affected corporate bottom lines, and nation-state attacks have threatened the security of entire countries, renewing the focus on and demand for cyberdefense.
-
For an unknown amount of time, anyone in any part of the world had access to 191 million Americans’ locations and political beliefs.
-
The new company, Keybase, will attempt to bring encryption technology to the masses using a concept called “public-key cryptography.”
-
Unlike most other areas of criminal investigation, in cyber crime the private security sector is seen as a huge partner to law enforcement, with its expertise and eagerness to close any vulnerabilities.
-
Although there have been several high profile gaffes, the U.S. Border Enforcement Agency is committed to employing new tech to adapt.
-
How did Guy Fawkes become transformed from a 17th-century Catholic conspirator to a tool of social protest?
-
Terry Branstad is trying to take a proactive approach to cybersecurity, assembling the state CIO, the National Guard and private industry leaders to draft a strategy.
-
Recent reports about a Democratic National Committee database breach that allowed staff within the Sanders campaign access to Clinton’s proprietary voter data has sparked concern from both leading democratic candidates about data security.
-
The Cybersecurity Information Sharing Act was included in the 2,242-page appropriations act passed earlier this month.
-
A digital surge could potentially drive the terrorist organization into the online equivalent of a remote cave: the so-called Dark Web that is not indexed by mainstream search engines.
-
Hundreds of state servers are open to attack due to ineffective security, poor password to control and failure to install security patches.
-
Authorities estimate that more than $100 million of illicit, unauthorized and counterfeit software and digital codes were sold to thousands of online customers by U.S. members of the piracy ring.
-
Internet of Things, ransomware attacks, mobile malvertising, elevation of cybersecurity role are signs of shifting threat landscape, ISACA says.
-
Federal cyber protection efforts grow this month with new soldiers being deployed across the nation to protect America's digital borders.
-
Verizon's latest report shows that nearly every organization public and private is vulnerable to the exposure of protected health information, despite access to controls designed to prevent such breaches.
-
The existence of coded communications is a reality -- and the U.S. may not be able to do much about it.