Cybersecurity
-
What is the current situation with nation-state cyber attacks in the middle of 2025? Here’s a look at some of the biggest cyber threats from Russia, China, Iran and North Korea.
-
The new information security leader, previously part of its technology organization, was formerly with Dallas, where he helped stand up that city’s first-ever cyber fusion and security operation center.
-
The latest in a series of text message schemes, this one messages residents’ cellphones seeking information. The state’s Department of Motor Vehicles commissioner said the agency does not ask for personal data over the phone.
More Stories
-
A trio of students from Forbes Road Career and Technology Center in Pennsylvania have spent the past year traveling to libraries, senior centers and schools with a presentation about cybersecurity and online scams.
-
Delta Dental of California and its affiliates have begun alerting roughly 7 million of its customers that hackers stole sensitive personal information as part of a global data breach that occurred back in May.
-
Armed with federal money, Indiana is giving endpoint detection and response services to local governments, with 31 entities signing up so far. But can the state make this last after the money runs out?
-
For the first time since 2007, NASCIO’s annual survey of state IT leaders was tied between two top priorities. That spot, normally dominated by cybersecurity and risk management, was joined this year by digital government and services.
-
Here’s what happens when you scan one of those ubiquitous two-dimensional black-and-white patterns, and why the FTC urges you to use caution.
-
An audit for the year ending June 30 by a Charleston-based accounting firm found that an agency within the Department of Transportation was risking unauthorized access to critical information systems.
-
For Indiana CIO Tracy Barnes, elevating cybersecurity, creating IT leadership training, enacting AI policy and laying the framework for a statewide digital ID program will take center stage in 2024.
-
The Chelan and Douglas County public utility districts are locking in specific security measures as cybersecurity breaches continue to target critical infrastructure across the country and state.
-
Harry Coker Jr. is now the second official national cyber director for the federal government, and he comes to the job with a resume that includes leadership stints with the CIA and the NSA.
-
A Connecticut school district made three payments, totaling roughly $180,000, to a potentially fraudulent bank account between Nov. 3 and Nov. 17 after one of the district's vendors was hacked.
-
A K-12 district in Northern Kentucky this week announced that a ransomware attack had removed some files from their servers without authorization, and they may be published online. Details are under investigation.
-
The effects of a November ransomware attack against Oceanside, Calif.’s Tri-City Medical Center were contained more than two weeks ago, but now those behind the cyber incident are publishing stolen data on the dark web.
-
In the wake of a cyber attack on a Western Pennsylvania water utility, federal officials are urging infrastructure operators to tighten their security — and they're warning that another attack could be coming.
-
Three weeks after a cyber attack took down multiple city of Huber Heights, Ohio, government systems and functions, officials have still not determined what, if any, resident personal data has been released by the hackers.
-
The Colorado Office of Information Technology is officially looking to hire for two executive-level IT roles: deputy executive director and chief information security officer.
-
A recent cyber attack in Southern California prompted officials to advise students and staff to not use their district-issued devices while IT crews worked to resolve the ransomware affecting their systems.
-
For the second time in as many months, Dallas County officials have disclosed they’ve been tricked by cyber criminals, only this time their mistake appears to have been far more costly.
-
Adopting a patch released in October — and removing any threat actors that may already be exploiting unpatched instances of the software — is important to defending against new actors known to exploit this flaw.