Cybersecurity
-
The University of Texas at San Antonio was supposed to have an administrative role in the new Texas Cyber Command, but it was written out of the final version of the bill signed by Gov. Greg Abbott.
-
What can public- and private-sector staff do to stay relevant and grow their career in the midst of AI-driven tech layoffs? Here’s a roundup of recent stories and solutions to help.
-
Michael Toland, Oklahoma’s chief information security officer, will exit the position and officials have embarked upon a search for his replacement. State CIO Dan Cronin will oversee cybersecurity in the interim.
More Stories
-
Jayson Cavendish had been filling in as the state’s CSO for months. He’s been officially been appointed the duties that used to belong to current Michigan CIO Laura Clark.
-
Wisconsin will be getting a new CISO following the departure of Alan Greenberg, who held the position since May 2021. The state has released few details about the reason for the staffing change.
-
Cleveland City Schools says is has found "no indication" of compromised data, but the district is working with police and Homeland Security, and a relatively small number of devices on its network have been affected.
-
The city, citing security risks from the massively popular social media platform, follows the lead of other public agencies. TikTok has been downloaded more than 220 million times in the U.S., according to an estimate.
-
State and federal law enforcement is investigating a phishing scheme that targeted Johnstown Regional Sewage. The agency has not confirmed if money or information was lost in the attack.
-
SponsoredPCI DSS v4.0, effective in 2024, brings major changes to security standards for public-sector credit card processing. Anti-phishing, patch management, web app security and network enhancements are key aspects.
-
While stressed-out cybersecurity staff is not a new issue, there are steps leadership can take to mitigate ongoing issues that may lead to staffing vacancies.
-
In an attempt to wipe identifying information that could aid and abet phishing operations, a proposal to remove employee names and contracts from the Bernalillo County, N.M., transparency portal is headed for public discussion.
-
After hackers used the email account of the New Haven Public Schools chief operating officer to steal more than $6 million, officials there are working to recover the money and block future cyber attacks.
-
A week after Dallas revealed 26,212 people have been impacted by the city’s ransomware attack, officials say it’s likely an ongoing review will find that more people had their personal information exposed.
-
The center will provide cybersecurity services to local government agencies, build a talent pipeline with high school and higher ed training options, and more.
-
President Joe Biden this week signed an executive order banning U.S. investments in China’s technology sectors. The move is part of an effort to slow the country’s military and cryptographic advancements.
-
The state’s plan addresses how current and anticipated initiatives support its larger goals of building resilience, preparedness and unification across cybersecurity efforts. The strategy takes a holistic approach across sectors.
-
The Dallas City Council approved nearly $8.6 million in payments for services related to the ransomware attack earlier this year, including credit monitoring for potential identity theft victims.
-
The police department will be installing Flock Safety Raven gunshot audio detectors in conjunction with additional Flock Safety license plate recognition cameras. The plan is raising privacy concerns.
-
The rise of artificial intelligence and deepfake technology is prompting a legislative response in the Bluegrass State. Lawmakers there have introduced a bill aimed at stiffening penalties for misuse of the technologies.
-
Officials are now saying that as many as 26,212 Texans were impacted by the ransomware attack that hit city systems between April 7 and May 4. The hackers accessed names and Social Security numbers among other information.
-
A new global report examines how threat actors who have breached a system are increasingly turning to legitimate software and valid credentials to stay hidden. Malicious actors are also becoming more cloud-savvy.