IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.


Work toward ensuring the security of internal IT systems, government data and citizens' personally identifiable information held by government. Includes coverage of privacy.

Some government technology leaders dismiss zero trust as another cyber buzzword. But your organization is probably already on its way to building a zero-trust framework with your existing efforts. Here's how to build on them.
The Iowa school district this week suspended summer programming for 750 students, on short notice and with scant details, while school officials worked with third-party cybersecurity experts to review a breach.
Almost a month after a cyber attack shut down its website and various other systems, the public community college has recovered phones, email and other functions while using in-person workarounds for others.
We’ve been hearing about upcoming breakthroughs with quantum computing technology for several years, so what’s the latest from around the world?
Chief Risk Officer Rob Main discusses balancing privacy and security, growing North Carolina's cyber workforce, and how his office is helping local governments build cyber capacity.
Despite a growing divide between the Democratic and Republican parties, both sides of the aisle can agree on the need for reliable voting technology and protections from bad actors heading into the next election.
Third-party provider Geographic Solutions reportedly offlined systems after an attempted malware attack. Some states report that unemployment claims and/or job search sites are currently unavailable.
Initial reports of the exposure of personal information about concealed handguns permits was more expansive than initially thought. California Department of Justice officials now say several other data sets were exposed.
Bellingham and Whatcom County libraries are responding to a potential malware incident that crippled digital services. County officials report that patron data does not appear to have been compromised in the attack.
Subpoenas sent this month are seeking evidence of whether election conspiracy theorists gained unauthorized access to Georgia voting equipment and copied sensitive files in Coffee County after the 2020 election.