Cybersecurity
-
The need to be connected is driving IT work across the state, from progress on a broadband expansion milestone to an interoperable radio network to collaborating with agencies to support their service delivery.
-
How can we describe the past year in cybersecurity? No doubt, AI was front and center in so many conversations, and now there’s no going back. Here’s why.
-
The document emphasizes governance, risk assessment and safety principles to protect operational technology as AI adoption grows. Understanding security concerns during development is one recommendation.
More Stories
-
After stopping the use of facial recognition software for more than a year amid civil liberties concerns, the Ohio attorney general’s office is once again using the technology.
-
Georgia is paying hackers thousands to break into a system that millions use to access assistance programs like food stamps and Medicaid, and they’ve already uncovered dozens of gaps, according to the state.
-
Lawmakers of both parties are eyeing legislation that would advance federal data privacy as well as measures that would address children’s online privacy. Colorado, Connecticut, Utah and Virginia have also passed privacy laws.
-
The measure, null, and its companion, null, are headed for final votes. Both measures attempt to give consumers the right to opt out of sharing their data for targeted online ads.
-
The federal agency, which is housed in the Department of Homeland Security, and allies released a guide to help communities plan for resiliency, defense and risk minimization when considering smart city initiatives.
-
The New Jersey Supreme Court is hearing a case where the state is arguing that Facebook should give it continuing access to user information to determine whether they're engaging in criminal activity.
-
The California State Auditor issued a report this week criticizing the Department of Technology for failing to guide the state’s IT needs, failing to assess agencies’ information security systems, and failing to reduce risks to IT projects.
-
As many still advocate for a national privacy law, experts debate where to set guidelines on how police work with constituent data. The discussion isn’t as simple as personal privacy versus community safety.
-
The Lake County Board of Elections is considering whether to implement poll worker management software they purchased or break the contract with the software provider amid security concerns.
-
Generative AI is designed to produce the unforeseen, but that doesn’t mean developers can’t predict the types of social consequences it may cause.
-
The Associated Press recently estimated that around two dozen U.S. lawmakers — all Democrats — still use the app from personal devices. Some have amassed sizable followings and use the app to communicate with constituents.
-
Caught by surveillance video, text messages and emails, overwhelming evidence shows that supporters of then-President Donald Trump copied Georgia’s statewide voting software from an election office in early 2021.
-
Election workers have begun conducting logic and accuracy testing to ensure the machines voters will use on election day are running properly before they are put into service May 16.
-
Cowlitz County has tightened its cybersecurity and payment policies after two losses of public funds, including $184,000 later recovered from a phishing scheme. The 2021 and 2022 incidents were reviewed in the county's annual accountability audit.
-
Information security veteran Bryce Carter says he will work with the IT department to evaluate Arlington’s security risks and needs and focus on creating an enterprise-wide security program.
-
Under a new state law, the CISO will report to a Cybersecurity Advisory Committee instead of the CIO. The committee will draw from different branches and levels of government.
-
Passwords are both annoying to use and vulnerable to hackers. Fortunately, big tech is moving to support stronger, easier-to-use passkeys.
-
CISA and federal and international partners released a report today providing software manufacturers with advice and specific guidance for creating products built and configured to be secure from the get-go.