Cybersecurity
-
As federal and state governments extend their lists of banned foreign technologies, where is this trend heading next? Is your home network safe for work use?
-
Chief Privacy Officer Martha Wewer reviewed the state’s approach to data protection, AI oversight and consumer privacy on Thursday as Gov. Josh Stein marked a new day of awareness during Data Privacy Week.
-
There was a record set for data breaches in 2025, and the incidents were also paired with fewer details in notification letters, raising concerns about transparency and public understanding.
More Stories
-
Though rare, the attacks are severe, often pulling a user’s bank records or targeting the account's contact list through phishing.
-
The department that runs the server that the website is on took the page down until it could be fixed.
-
Experts warned that hackers have gone from big targets and corporate victims like those named in recent criminal indictments to smaller companies, which make up the core of the economy.
-
A new ranking of popular encrypted messaging programs finds the ones that are most effective at protecting users’ privacy.
-
Consortium organizers have a $2 million commitment from an undisclosed industry source toward the estimated $8 million to $10 million needed for the first four years of operation.
-
The state Office of Technology sent out two mass emails to state employees – one that explained the malware attack and another that gave tips for preventing similar incidents in the future.
-
Anonymous operatives have outed at least 18 police officers, officials and residents over the past three months.
-
Local officials have been incensed over leaked information appearing in media reports, including what witnesses said in front of the grand jury, whose workings are supposed to be confidential.
-
Private industry experts said they believe hackers in Eastern Europe devised the malware, and they said it seems ready to blow up across computer networks.
-
State CIOs voted on their top priorities for the coming year, reflecting little change from the past few years.
-
A majority of Internet experts think that by 2025, a major cyberattack will have caused widespread harm to a nation's security and capacity to defend itself and its people.
-
The California Data Breach Report underscores the difficulties faced by companies who are constantly racing to secure sensitive information.
-
The process hackers follow to infiltrate an organization has been called a Kill Chain, and security teams must find a way to detect and break this sequence of events.
-
To protect their systems from attacks, organizations need to build a culture of risk management from the ground up.
-
Winners of the 2014 Cybersecurity Leadership and Innovation Awards have demonstrated they are serious about cybersecurity defense by putting into place systems, practices and policies that keep information safe for citizens.
-
Increased state investment in fusion centers may suggest a change of opinion on the information-gathering groups.
-
Seattle's acting CISO was hired in a permanent capacity, and says that when it comes to data security, the government's responsibilities increasingly align with those of the private sector.
-
Despite the expectation to report findings almost immediately, officials should use caution and avoid communicating information too quickly.
Most Read