Cybersecurity
-
Chief Privacy Officer Martha Wewer reviewed the state’s approach to data protection, AI oversight and consumer privacy on Thursday as Gov. Josh Stein marked a new day of awareness during Data Privacy Week.
-
There was a record set for data breaches in 2025, and the incidents were also paired with fewer details in notification letters, raising concerns about transparency and public understanding.
-
Following a turbulent year in cybersecurity, the state Governor’s Technology Office is seeking to hire a new cybersecurity lead to manage risk and compliance. Nevada’s permanent CISO retired in May 2025.
More Stories
-
A recent audit finds California’s efforts are woefully inadequate. And that’s the good news.
-
A threat by Anonymous to unmask at least 1,000 members of the Ku Klux Klan might have come to fruition Sunday when the names of notable politicians, supposedly affiliated with the hate group, started coming to light.
-
The Cybersecurity Strategy Implementation Plan (CSIP) is the latest addition to the Obama administration's larger efforts to combat cyber threats.
-
The Department of Homeland Security recently announced the state won't get another extension to comply with the Real ID Act, which was passed a decade ago.
-
Because of recent updates to the encryption on Google and Apple software, newly updated Androids and iPhones no longer can be unlocked -- even if law enforcement officers have a warrant.
-
A group of police officers in the state have taken steps to keep track of any public threats due to increased public attention during election season.
-
The Cybersecurity Information Sharing Act passed in the Senate by a wide margin, but must still clear the House and President Obama's desk. Proponents say the bill bolsters cybersecurity; opponents say personal privacy is at risk.
-
The Midwest Cyber Center of Excellence will serve private business that want to beef up their cybersecurity systems, help train workers in the field and serve as a research institution to combat hackers.
-
Attorney for the office said no data was taken, and the site will move to a more secure domain.
-
For a good defense, organizations must cover all vulnerabilities, external and internal.
-
With no legal framework regulating the exchange of personal information across shores, the U.S. and the European Union hash out the details of a new plan.
-
According to the commander of U.S. Cyber Command, there is a disturbing trend afoot that could give people a reason to distrust online data.
-
Winners were selected for their achievements during the past two to three years as they pertain to the advancement of cybersecurity.
-
The 2015 North American International Cyber Summit brought security and government bigwigs together for a meeting of ideas on how to tackle cybersecurity in a world rife with threats.
-
Billions of devices can connect to the Internet, affording cyberattackers a wide range of opportunity.
-
A recent study has found that a major cyberattack on the U.S. power grid has the potential to cause $1 trillion in damage.
-
The new policy will provide alerts to platform users believed to be targeted by hackers after personal information.
-
Although the meeting between President Obama and Chinese President Xi Jinping was only three weeks ago, one security firm has detected an attempted attack by hackers associated with the Chinese government.