Cybersecurity
-
To avoid creating vulnerabilities, school IT leaders often find themselves saying "no" to new tools and systems. Instead, they should foster a culture of innovation by convening partners to figure out how to make it work.
-
SponsoredA new wave of employment fraud is targeting U.S. companies, with fake candidates using AI-enhanced resumes and stolen identities to infiltrate organizations. Socure uncovers how these sophisticated schemes, often linked to foreign operatives, pose significant security risks and highlights the urgent need for advanced identity verification in hiring processes.
-
SponsoredAs government services move increasingly online, public-sector websites have become both vital touchpoints and vulnerable targets. This article outlines a strategic, cloud-first approach to securing the digital front door — with insights on AI, zero-trust frameworks and modern best practices.
More Stories
-
The city issued a formal notice for the first time about potential data being exposed since detecting the ransomware attack by hacking group Royal. Officials say the data of “certain individuals” was accessed by the group.
-
Emphasizing the importance of cyber-range simulations and hands-on training, experts from Cyberbit said in a webinar on Thursday that such exercises are becoming part of university strategies to meet workforce demands.
-
For the second time in the state, a large number of people had their data exposed when hackers exploited vulnerabilities in the file transfer tool MOVEit. The breach targeted a contractor to the Oregon Health Plan.
-
Officials announced that the county had been targeted by CL0p, a hacking group tied to Russia, in a cybersecurity breach of the common file transfer tool MOVEit. A range of sensitive personal data was affected in the breach.
-
The portal that gives users access to Cherokee County planning and zoning documents is undergoing an overhaul to implement more stringent cybersecurity protocols while creating a more user-friendly experience.
-
SponsoredFaced with rapidly changing payment trends and evolving student preferences, colleges and universities must offer a variety of enhanced payment options while making sure transactions remain secure.
-
Officials say the group, called Volt Typhoon, has inserted malware deep in the systems of numerous water and electric utilities that serve military installations in the United States and abroad.
-
The special group tapped by Gov. John Bel Edwards' administration in 2019 to respond to cyber attacks has been in a state of near constant activation. The costs to the state and local government agencies have spiraled in that time, state data shows.
-
No data was compromised after staff stopped a cyber attack aimed at the town of Cornelius, following an incident that started when a police officer inadvertently interacted with a computer virus during an investigation.
-
The county is currently looking into whether data was exposed during a breach of a file transfer system used by a billing provider for its fire and emergency services system.
-
As cities, counties and states deal with hacks, data leaks and other malicious attacks, the Seattle-based firm is debuting a security tool designed for public agencies. The company’s clients include Dallas County.
-
Legislative momentum to stop law enforcement from using Google data obtained through so-called geofence warrants stalled as lawmakers struggled to find a way to increase data protection for abortion seekers.
-
In an email sent Tuesday to city employees, City Manager T.C. Broadnax said information stored by the city’s human resources department was exposed in the May cyber attack against city systems.
-
The ransomware attack, concealed in an email, downed all three of the George County’s servers when it struck on July 15. The incident prompted an emergency declaration that allowed the IT team to circumvent contracting processes.
-
The city's Public Safety Committee has voted to support the San Diego Police Department's controversial smart streetlight proposal this week. The technology, complete with license plate readers, was first pitched in March.
-
It’s difficult to see how artificial intelligence systems work, and to see whose interests they work for. Regulation could make AI more trustworthy. Until then, user beware.
-
The lawsuit alleges facial recognition technology used on the app until November 2021 violated Illinois’ biometric privacy law, which is considered the strictest in the nation.
-
San Diego officials on Tuesday gave themselves another three years to review the city’s many surveillance technologies, an extension that should prevent the tools from being put on pause.