Cybersecurity
-
Chief Privacy Officer Martha Wewer reviewed the state’s approach to data protection, AI oversight and consumer privacy on Thursday as Gov. Josh Stein marked a new day of awareness during Data Privacy Week.
-
There was a record set for data breaches in 2025, and the incidents were also paired with fewer details in notification letters, raising concerns about transparency and public understanding.
-
Following a turbulent year in cybersecurity, the state Governor’s Technology Office is seeking to hire a new cybersecurity lead to manage risk and compliance. Nevada’s permanent CISO retired in May 2025.
More Stories
-
The Ghost Security Group -- which is completely independent of any official state agency -- is providing valuable information on supposed ISIS online activity to the FBI.
-
Following a coordinated attack in Paris on Nov. 13, some are asking whether law enforcement should have access to encrypted social network platforms, like Telegram, allegedly used for terrorist planning purposes.
-
The Secretary of State’s office allegedly improperly released sensitive information to buyers of voter registration data.
-
ISIS uses the internet, especially social media, to propagandize and recruit. Members of hacker group Anonymous have turned their sights on these accounts.
-
Cyberdefenses and increased spending are part of the British response to multiple terror attacks launched in Paris, France, last week. With as many as 129 dead in the coordinated attacks, governments are looking at how to deal with the violent militant group known as the Islamic State.
-
When speaking at the Group of 20 Summit, President Obama announced that the country would allow France access to possible threat information in an effort to protect against terrorist attacks.
-
The group is urging credit card companies and private businesses to adopt Europay, MasterCard and Visa specifications for more security for consumers.
-
With the current trend of end-to-end encryption meant to protect user privacy, many police agencies are having a difficult time decoding potentially dangerous threats.
-
The center has been an outspoken proponent of advancing what it calls critical security controls, which serve as a substantive starting point for organizations looking to beef up their organizational cybersecurity standing.
-
Employees will go through exercises in how to combat cyberthreats by using teamwork to protect valuable data.
-
From access to activation, we pass through multiple digital ecosystems with devices that can be used to hack unrelated digital system processes in a millisecond.
-
After a few years of searching for the right CISO, Illinois' technology office is confident in its choice.
-
A cyberattack affected the San Jose Police Department and inconvenienced city website users until a resolution was reached Monday afternoon.
-
Kevin Burns, chief information security officer for the Massachusetts Office of Information Technology talks about his state's approach to cybersecurity.
-
The compromise would let gun dealers sell personalized guns, but they also would be able to continue selling traditional firearms.
-
After the cyberattack on Sony Pictures, the Obama administration set of responses has been dubbed as the "Cyber Monroe Doctrine."
-
Organizations with sensitive data are having to look more carefully than ever before at how they approach their cybersecurity strategies in the face of more organized threats. One expert advocates for collecting and sharing information to better thwart bad actors.
-
Peer-to-peer cybersecurity threat intelligence exchanges are becoming more popular among IT professionals, a recent survey found.