Cybersecurity
-
To avoid creating vulnerabilities, school IT leaders often find themselves saying "no" to new tools and systems. Instead, they should foster a culture of innovation by convening partners to figure out how to make it work.
-
SponsoredA new wave of employment fraud is targeting U.S. companies, with fake candidates using AI-enhanced resumes and stolen identities to infiltrate organizations. Socure uncovers how these sophisticated schemes, often linked to foreign operatives, pose significant security risks and highlights the urgent need for advanced identity verification in hiring processes.
-
SponsoredAs government services move increasingly online, public-sector websites have become both vital touchpoints and vulnerable targets. This article outlines a strategic, cloud-first approach to securing the digital front door — with insights on AI, zero-trust frameworks and modern best practices.
More Stories
-
According to experts on identity theft, thieves are increasingly using real Social Security numbers with random or fake names to create new identities — otherwise known as synthetic identity fraud.
-
Federal lawmakers are asking how to better help the critical infrastructure sector defend against cyber threats. The answer may involve tailored, actionable intelligence and minimum cybersecurity requirements.
-
City officials are looking to increase training and get a new anti-virus module as part of $336,697 added to the $3.2 million contract the city has with Chicago-based Data Defenders LLC, a computer security firm.
-
Government agencies have heard about the best practices, read the recommended frameworks and implemented some solid cybersecurity strategies, yet attacks continue to rise. Here's how to keep improving.
-
The New Jersey Office of Homeland Security and Preparedness has launched a disinformation portal to give residents a fighting chance at distinguishing real from falsified online content.
-
Cash App, a popular mobile payment service, said a data breach could potentially affect 8.2 million of the app’s current and former users. A former employee inappropriately downloaded reports with customer data.
-
As cyber attacks on infrastructure like utility services increase globally, city and county leadership must look to other governing bodies and cybersecurity experts to strengthen their own systems.
-
As tensions between the U.S. and Russia mount, Cyberspace Solarium Commission members and critical infrastructure owners discussed the work ahead to collaborate more effectively on cyber defense.
-
According to data from CyberSeek, there are about 600,000 unfilled cybersecurity positions throughout the United States. With cyber threats on the rise, the shortage could make it easier for hackers to thrive.
-
A ransomware group called Hive is claiming to have stolen private data for 850,000 members of Partnership HealthPlan of California, a nonprofit that manages health care for Medi-Cal patients in 14 counties.
-
Local officials, voting rights supporters and the election security community have spoken against Georgia’s latest voting bill. Multiple officials said the bill would create needless “security theater” busywork.
-
South Dakota Gov. Kristi Noem recently signed legislation outlining the use of $1.2 million by South Dakota State University and Dakota State University to create a precision agriculture cybersecurity partnership.
-
Over 2,000 employees who work at the Cheyenne Regional Medical Center were either overpaid or underpaid thanks to a December ransomware attack that targeted payroll company Kronos.
-
A recent report from the University at Albany’s Center for Technology in Government shares helpful theory and tools for communicating the value and practicality of digital transformation to public-sector leaders.
-
According to an announcement from Apple, Arizona has started allowing the use of digital IDs and driver's licenses at the Phoenix Sky Harbor International Airport. Other states are soon to follow.
-
According to the U.S. Department of Justice, Russia-backed hackers had their sights set on a nuclear power plant in Kansas as part of a plot to take control of critical infrastructure.
-
Biden’s extension of the White House cybersecurity task force to water is validation of years of local work and advocacy. Here's how utilities can make the most of this federal support and investment.
-
Arizona CISO Tim Roemer and Virginia CISO Mike Watson discuss how zero trust can ease cybersecurity concerns over remote work and insider threats, and Watson highlights complicated privacy questions facing states.