-
A contract with Motorola Solutions will enable the county to do a better job of safeguarding its emergency radio communications system. Tower sites and radio dispatch consoles will get 24/7 security.
-
With its longtime federal support now withdrawn, one of the country’s largest public-sector cybersecurity support organizations has moved to a new paid model where states handle the bill for its services.
-
The state of Kentucky granted the University of Louisville $10 million for the construction of a new cybersecurity center, which will include a cyber range and a secure space for sensitive information.
More Stories
-
The new cyber legislation that requires operators of critical infrastructure to report cyber attacks is not enough. U.S. lawmakers are looking for other ways to ensure critical infrastructure is protected.
-
The Cybersecurity and Infrastructure Security Agency has designated 16 sectors — ranging from banks and financial institutions to hospitals and election systems — as critical. But not all sectors have the same defense capabilities.
-
More than $2 million in new funding for a major overhaul of the Elkhart County government's information technology network was approved Monday by the Elkhart County Board of Commissioners.
-
Joe Brazier leads K-12 strategy on Microsoft's worldwide education team. This week he answered the "In Case You Missed It" crew's questions about the changing needs of educators in the wake of COVID-19.
-
Newly minted Colorado Chief Information Security Officer Ray Yepes will officially assume the role later this month. He replaces former CISO Deborah Blyth, who left state service last August.
-
Cloud services are convenient, but if an organization isn’t careful about how they use them, the services can also give data thieves an opening.
-
Staff at Bernalillo County’s accounts payable department became the dupes in a fraudulent “confidence trick” in late 2019 by paying out $447,372 to what they thought was an approved county vendor.
-
How can public-sector CISOs navigate the complicated issues surrounding budgets? Through good times and bad, these ideas can help.
-
According to experts on identity theft, thieves are increasingly using real Social Security numbers with random or fake names to create new identities — otherwise known as synthetic identity fraud.
-
Federal lawmakers are asking how to better help the critical infrastructure sector defend against cyber threats. The answer may involve tailored, actionable intelligence and minimum cybersecurity requirements.
-
In response to an audit, the Otego-Unadilla Central School District is developing an IT contingency plan and other procedures for managing user access, account monitoring and IT security training.
-
City officials are looking to increase training and get a new anti-virus module as part of $336,697 added to the $3.2 million contract the city has with Chicago-based Data Defenders LLC, a computer security firm.
-
Government agencies have heard about the best practices, read the recommended frameworks and implemented some solid cybersecurity strategies, yet attacks continue to rise. Here's how to keep improving.
-
The New Jersey Office of Homeland Security and Preparedness has launched a disinformation portal to give residents a fighting chance at distinguishing real from falsified online content.
-
In light of the largest recorded student data breach in U.S. history, Education Week breaks down eight suggestions for how school districts can prevent cyber intruders from accessing their networks.
-
The state budget signed last week by Gov. Jay Inslee includes money to create a master’s degree and two bachelor’s degree programs at Eastern Washington University, and a bachelor’s program at Washington State University.
-
Experts say schools are unlikely to be direct targets of Russia, but they could be caught up in broader attacks against the U.S. Many districts are upgrading firewalls, monitoring networks and testing backup procedures.
-
As cyber attacks on infrastructure like utility services increase globally, city and county leadership must look to other governing bodies and cybersecurity experts to strengthen their own systems.
Most Read