Cybersecurity
-
Chief Privacy Officer Martha Wewer reviewed the state’s approach to data protection, AI oversight and consumer privacy on Thursday as Gov. Josh Stein marked a new day of awareness during Data Privacy Week.
-
There was a record set for data breaches in 2025, and the incidents were also paired with fewer details in notification letters, raising concerns about transparency and public understanding.
-
Following a turbulent year in cybersecurity, the state Governor’s Technology Office is seeking to hire a new cybersecurity lead to manage risk and compliance. Nevada’s permanent CISO retired in May 2025.
More Stories
-
The Department of Defense announced it will start providing venture capital funding to Silicon Valley startups that can help develop more advanced cybersecurity and intelligence systems.
-
If passed, the USA Freedom Act would put an end to the controversial NSA bulk collection of phone records.
-
Technologists wonder whether using fingerprints, faces or devices to log in would help or hurt the cause of data security and privacy.
-
In the future, cybersecurity program coordinators hope to expand basic instruction campus-wide by teaching students how to value their data.
-
A recent report found that states are plagued by a number of problems in hiring and retaining IT staff— especially cybercrime experts.
-
Lt. Gen. Edward Cardon's visit to Tacoma came on the heels of the recent unveiling of a Pentagon cybersecurity strategy that includes a renewed relationship with Silicon Valley firms.
-
The feds are gearing up to share proactively in an effort to build trust across the layers of governmental entities, and across the public-private sector divide — and it will ultimately enable more productive sharing and communication among state and local governments.
-
University researchers are planning lessons to teach middle and high school students about computer literacy starting in the fall.
-
NASCIO members will lobby federal officials on state IT concerns this week.
-
A House panel late Monday learned some Harris County officials are not too keen on online voter registration. Lawmakers have filed two bills that would bring the practice to Texas.
-
In passing two bills, instead of one, House leaders gave an ambiguous answer to how the government plans to handle cyberthreats.
-
Industry insiders say people need to keep paying attention -- if not to prevent fraud, then at least to catch it as soon as possible.
-
A tweet from a cybersecurity expert suggesting he could hack into an airline's onboard system has officials downplaying vulnerabilities resulting from increasingly Internet-connected airplanes.
-
Key pillars of the strategy include defending DOD networks from malicious actors, protecting the United States from destructive cyberattacks and going on the offense when necessary.
-
As we welcome Amazon and other tech-savvy firms into our lives, critics worry about the future of our data.
-
Check out this infographic to better understand the scale of cybersecurity threats in 2015.
-
In a speech at Stanford University, Defense Secretary Ashton Carter shared the Pentagon's goal of strengthening existing relationships and building new ones, including investments in startup companies.
-
We’ve come a long way since floppy disk viruses were created for fun not profit, but the angles of attack have changed and our defences must change with them.
Most Read