-
CIO Shawnzia Thomas decodes why "cyber discipline" drives AI, modernization, and trust in Georgia’s 2026 tech agenda, and how cyber resilience is achievable through digital literacy and upskilling.
-
Officials from the state Department of Accounting and General Services warned residents that bad actors are “creating deceptive web addresses” to trick them into releasing personal information.
-
As a Missouri website that serves more than 50,000 state employees remains shut down after suspicious activity, it appears that quick work by fraud protection systems may have blocked unauthorized transactions.
More Stories
-
After approximately 300 students' photos and ID numbers were stolen from a backpack in a staff member's vehicle, the district's technology team monitored student accounts as a precaution.
-
A new report from Auburn University’s McCrary Institute for Cyber and Critical Infrastructure Security provides recommendations for the incoming presidential administration. Here are some report highlights.
-
The nonprofit group’s weighted framework of 14 controls seeks to simplify school cybersecurity in an effort to make the most critical protections more approachable and, in turn, more widespread.
-
New Hampshire has turned to security assessments plus a set of “Drinking Water Cybersecurity in a Box” turnkey solutions to reach a good baseline defense for its water systems.
-
U.S. President Joe Biden’s first National Security Memorandum on artificial intelligence directs the federal government to take steps to ensure AI supports the national security mission. Stakeholders were supportive.
-
The 2025 EDUCAUSE Top 10 list, a snapshot of top priorities in higher education, focuses on earning back trust through technology and data. Several indicators show faith in the value of higher ed and the integrity of tech companies is declining.
-
The university did not admit any wrongdoing and no determination of liability has resulted from the suit. It had been accused of failing to comply with cybersecurity requirements in contracts or subcontracts involving the U.S. Defense Department or NASA.
-
In a move to enhance cybersecurity and digital services statewide, the Indiana Office of Technology is offering no-cost websites to all local governments, using its purchasing power with Tyler Technologies.
-
Higher education is uniquely vulnerable to cybersecurity attacks, presenters at one EDUCAUSE Annual Conference session said, and institutions should work together to address their vulnerabilities. Training and awareness are vital.
-
The Massachusetts-based program supports upskilling candidates to fill the state's workforce expertise needs, doing so via non-academic degree training programs that offer hands-on experience.
-
Given the rate of student and staff turnover, not to mention synthetic identities and fraud by "ghost students," identity and access management is a challenging but essential aspect of an institution's cybersecurity.
-
The Cybersecurity Research and Outreach Center at Emporia State donated a pair of computers to the local senior center, and ESU students will provide monthly classes on topics such as scams and basic computer skills.
-
Carlisle Area School District has applied for funding from the Federal Communications Commission's Strategic Cybersecurity Pilot Program, which could yield $200,000 for cybersecurity defense over the next three years.
-
Sara Snell started her career as an elementary school teacher. Here is her journey to becoming a state government cyber professional.
-
Puerto Rico faces earthquakes, hurricanes and tsunamis. North Carolina was hard-hit by Hurricane Helene. Through it all, government needs to keep critical digital services running. Here’s how they do it.
-
A Georgia school district was making do without Internet and email services this week as officials investigated the source of a network outage. They did not confirm whether it was caused by ransomware.
-
Officials at the Municipal Authority of Westmoreland County said the entity, a water and sewer utility, recovered more than $826,000 stolen in a “vendor impersonator” phishing scheme. This, an expert said, is a rare occurrence.
-
Whether it be moving to the cloud or adopting artificial intelligence, the technology needs of government continue to evolve, and agencies must make sure that their technologists' skills evolve as well.