Cybersecurity
-
Jennifer Pittman-Leeper is GovRAMP’s new field CISO, which is an advisory role. Meanwhile, the nonprofit organization has now added North Carolina to the states that it provides cybersecurity guidance.
-
A Chicago-area elementary school technology director recently spoke about the most vulnerable spots in school districts, the rising use of deepfakes, and the growing sophistication of email phishing attempts.
-
Internet services are still down at City Hall and other departments nearly a week after officials uncovered the attempted incident. Residents are unlikely to notice significant disruptions, officials said.
More Stories
-
A ruling by the Federal Communications Commission and two joint resolutions introduced in Congress would make it harder for consumers to keep their personal information private.
-
Assemblyman Jay Obernolte is renewing Republican efforts to codify into state law Gov. Jerry Brown’s cybersecurity center.
-
Cybersecurity risks and antiquated technology are front and center at the Legislature this spring, where lawmakers are considering whether to spend more than $100 million to bring the state’s software into the current decade.
-
A recent data dump contained nearly 9,000 pages of purported internal CIA documents that indicated the spy agency had gained access to Android and Apple smartphones, Samsung SmartTVs and Internet-enabled cars using a variety of tools.
-
While California cybersecurity officials agree that speaking out after an incident can be a disheartening experience, they also agreed that it is essential to communicating a potentially active threat and coordinating an appropriate response.
-
The GSA's Office of Inspector General found that 18F disregarded several security rules and other governmental procedures, but the states it has recently contracted with say they're not concerned about similar issues.
-
Ransomware blocks access to a computer system, making its contents inaccessible absent some form of payment -- or ransom.
-
WikiLeaks will release the code showing how the CIA managed to break into phones, work around encrypted messaging apps and avoid detection by software designed to defend against cyberattacks.
-
During an upcoming cyber defense competition, a community college team will face a scenario that a real IT team might face — trying to keep the opposition out and protect customers’ data.
-
The report indicated 30,899 cyberincidents occurred in 2016 that led to the “compromise of information or system functionality”
-
In 15 states and the District of Columbia, tax returns that are flagged as unusual are issued as a paper refund check.
-
A slew of new legislation proves that technology is at the forefront of the collective legislative mind at the state level.
-
An AT&T pact offers assistance to Texas agencies in managed security services areas including security monitoring and incident response, and can help them meet a legislative assessment target.
-
Florida is the 17th state to apply for its share of a $380 million pot of money included in a spending bill that Pres. Donald Trump signed two months ago.
-
A team of ISU computer scientists is working together to create an algorithm on school data extremely difficult, even for today's hackers.
-
Portland's chief technology officer is warning of an increase in sophisticated attempts from hackers trying to pry open city government computer systems.
-
States jumped in to try to regulate Internet privacy. But they are finding it tough sledding in the face of opposition from Internet service providers and other businesses.
-
The $100 million Hull McKnight Georgia Cyber Training and Innovation Center is set to open July 10.