Cybersecurity
-
To avoid creating vulnerabilities, school IT leaders often find themselves saying "no" to new tools and systems. Instead, they should foster a culture of innovation by convening partners to figure out how to make it work.
-
SponsoredA new wave of employment fraud is targeting U.S. companies, with fake candidates using AI-enhanced resumes and stolen identities to infiltrate organizations. Socure uncovers how these sophisticated schemes, often linked to foreign operatives, pose significant security risks and highlights the urgent need for advanced identity verification in hiring processes.
-
SponsoredAs government services move increasingly online, public-sector websites have become both vital touchpoints and vulnerable targets. This article outlines a strategic, cloud-first approach to securing the digital front door — with insights on AI, zero-trust frameworks and modern best practices.
More Stories
-
Twenty-one states have a CPO position, up from just 12 in 2019. States appear to be recognizing the need to tackle privacy as government data collection grows, but CPOs still struggle to get enough funds.
-
Former CISA Director Chris Krebs, Color of Change President Rashad Robinson and journalist Katie Couric discussed the societal threat of dis-, mis- and malinformation as the RSA Conference concluded last week.
-
After years of delay and discussion, Congress has released a bipartisan draft bill outlining a comprehensive federal data privacy policy. However, the proposal fails to adequately address two major issues.
-
Election-related disinformation continues to spark real threats. Paying close attention to these online conversations can tip off local governments to serious risks, says Maricopa County, Ariz., CISO Lester Godsey.
-
A recent surge in cyber attacks on ag companies during critical planting and harvest seasons has prompted a warning from the FBI and efforts within the industry to develop stronger individual and shared defenses.
-
NIST’s National Cybersecurity Center of Excellence has released the first of several preliminary drafts outlining ways that organizations can implement zero-trust architectures.
-
CISA Director Jen Easterly and National Cyber Director Chris Inglis promote collaboration — but will their successors do the same? Does describing the work as “data care” not “cybersecurity” help with talent recruitment?
-
Everyone from the press office to city treasurer has a role to play in cyber incident response, and getting elected officials engaged early is essential, say Coalition of City CISOs co-chairs.
-
Desain brings more than 20 years of experience to the role. Most recently, he served as the director of the Office of Counter Terrorism Cyber Incident Response team within the state Division of Homeland Security and Emergency Services.
-
Federal cybersecurity grants are expected “in the coming months,” with CISA still mulling feedback and finalizing. Local governments should use the time to ensure they’re part of any state planning processes.
-
The U.S. Cybersecurity and Infrastructure Security Agency issued a report last week highlighting potential hacking vulnerabilities with the Dominion Voting Systems touchscreen voting machines used by the state.
-
Former CISA director Chris Krebs has joined data security firm Rubrik, where he’ll help the firm better understand unmet cybersecurity needs across different sectors. The company homes in on data resiliency and recovery.
-
Gov. Jared Polis this week signed into law SB22-153, which requires new security measures for election systems, and HB22-1273, which makes it a crime to threaten election officials or publish their personal information online.
-
North Dakota and Indiana passed laws last year requiring local governments to report cyber incidents to the state. The states say this helps them direct cybersecurity resources to localities in need and better understand the threats.
-
Government agencies and innumerable contractors have access to vast amounts of information on individual state residents, and government agencies are heavily targeted by hackers for political and financial reasons.
-
State chief information officers get specific about their responsibilities when it comes to the cyber health of the state itself, as well as the myriad governmental organizations within it.
-
Several states are offering legal safe harbors to businesses that follow industry-recommended cybersecurity frameworks, in a carrot-not-stick approach intended to encourage better defenses.
-
A digital twin is to a computer model as live video is to a still photo. These virtual replicas can be used to understand and make predictions about a wide range of complex systems, including people.