Cybersecurity
-
Legislation proposed by Sen. Mary Elizabeth Coleman, R-Arnold, would do away with several state boards and commissions. If it becomes law, the Missouri Cybersecurity Commission would be among them.
-
Cybersecurity experts say AI and automation are changing how much impact manipulated data can have on government technology systems.
-
Laci Henegar, Rogers State University's STEM coordinator, graduated in December with the university's first master's degree in cybersecurity policy, governance and training.
More Stories
-
South Dakota Gov. Kristi Noem recently signed legislation outlining the use of $1.2 million by South Dakota State University and Dakota State University to create a precision agriculture cybersecurity partnership.
-
Over 2,000 employees who work at the Cheyenne Regional Medical Center were either overpaid or underpaid thanks to a December ransomware attack that targeted payroll company Kronos.
-
A recent report from the University at Albany’s Center for Technology in Government shares helpful theory and tools for communicating the value and practicality of digital transformation to public-sector leaders.
-
According to an announcement from Apple, Arizona has started allowing the use of digital IDs and driver's licenses at the Phoenix Sky Harbor International Airport. Other states are soon to follow.
-
According to the U.S. Department of Justice, Russia-backed hackers had their sights set on a nuclear power plant in Kansas as part of a plot to take control of critical infrastructure.
-
Biden’s extension of the White House cybersecurity task force to water is validation of years of local work and advocacy. Here's how utilities can make the most of this federal support and investment.
-
Arizona CISO Tim Roemer and Virginia CISO Mike Watson discuss how zero trust can ease cybersecurity concerns over remote work and insider threats, and Watson highlights complicated privacy questions facing states.
-
Charges have been brought against more than a dozen individuals in Oregon who attempted to apply for more than $180 million in fraudulent federal relief money. Investigators expect to find more fraud in the coming years.
-
Criminal hacking organizations such as Russia-based REvil often use phishing to lure unsuspecting employees into opening innocuous-looking emails containing malicious code that provides access to computer systems.
-
A recent warning from President Joe Biden suggests that Russia-backed hackers could be waiting on a timely order from President Vladimir Putin before unleashing havoc on their enemies' computer systems.
-
Two platforms are offering another layer of security in the voting process; one offers voters real-time alerts if registration information changes, while another flags unusual patterns of record updates for election officials.
-
The FBI's Internet Crime Complaint Center, which is responsible for publishing the annual report, fielded complaints from 5,426 victims in the state, according to a Tuesday FBI press release.
-
Brahmapuram will be resigning this month, spurring a nationwide search for his replacement. He spent nearly 2.5 years with Washington Technology Solutions, coming to the Pacific Northwest from South Carolina state government.
-
As cyber attacks, including denial-of-service hacks, increase worldwide amid the war in Ukraine, we take a look at data from Cloudflare showing the countries with the highest concentration of DDoS traffic.
-
President Joe Biden said that it’s still a “critical moment” to improve domestic cybersecurity after new evidence shows Russia is considering options for cyber attacks against the United States.
-
Body camera footage captured by a sheriff's deputy in Emmet County, Mich., provides some insight into how a small group fueled by misinformation attempted to take election data from a county office.
-
Gov. Michelle Lujan Grisham on Friday announced she has appointed Annie Winterfield Manriquez as her senior adviser for cybersecurity and critical infrastructure, a role with many new duties.
-
The online center will host educational resources for organizations to learn about the cybersecurity method and will offer a training for a professional credential in Zero Trust Knowledge.