More Stories
After a string of high-profile cyber attacks against U.S. companies, lawmakers argue that companies should more openly share information with government agencies when they pay a ransom demand.
Those working to define 5G standards have an opportunity to fix security weaknesses discovered in 4G. They also must tackle the distinct risk landscape presented by next-gen network’s open architecture.
Hackers gained entry into the networks of Colonial Pipeline Co. on April 29 through a virtual private network account, which allowed employees to remotely access the company’s computer network.
Laurie R. Doran has been appointed to lead the New Jersey Office of Homeland Security and Preparedness, the governor announced Friday. The agency oversees counterterrorism and cybersecurity work.
For about two years, the Anchorage Police Department in Alaska accidentally uploaded personal information of individuals involved in traffic accidents to LexisNexis. A system malfunction caused the leaks.
Some experts place at least partial blame on COVID-19 for the recent onslaught of cyber attacks on public and private entities. Between May 2020 and May 2021, the FBI saw complaints about cyber crime jump by 1 million.
The police force of Azusa, Calif., recently experienced a ransomware attack, an event hidden from the public for months. A new investigation shows the agency also remained silent about an attack that occurred in 2018.
Cybersecurity leaders debated choosing the right security framework, using AI to get ahead of threats and making developers the stars of cloud-based defenses during a recent panel discussion.
New York Power Authority officials say they are taking steps to ensure they are protected against cyberattacks like those that occurred with Colonial Pipeline this year and SolarWinds in 2020.
Next month, West Virginia Chief Technology Officer Joshua Spence will be recognized as the state chief information officer. Spence said the title change represents a larger strategic vision for the state.
Mobile County, Ala., shut down its IT systems for three days after a malware infection last week. The county hasn't revealed which system components were affected. The federal government is looking into the attack.
In this article, we’ll walk you through the basic principles of the CJIS security policy (such as the 13 policy areas), how to best comply with these policies, and solutions for how to best address the various security requirements outlined in the policy.
The cashless parking app used in several U.S. cities announced that it had been breached by a cyberattack earlier this year. According to ParkMobile, no credit card information was accessed in the incident.
The Russia-backed hackers behind the massive SolarWinds cyberattack earlier this year are increasing their attacks against the U.S. government, according to analysis by software giant Microsoft.
Coming on the heels of a political scandal and a large cyber attack, Scranton’s recent move to modernize its ERP system is key to rebuilding public trust, ensuring security and bringing city operations up to date.