-
Arizona CIO J.R. Sloan, co-founder of GovRAMP, has served as its board president since 2021. Now, Texas Chief AI and Innovation Officer Tony Sauerhoff will take on the leadership role.
-
What were the top government technology and cybersecurity blog posts in 2025? The metrics tell us what cybersecurity and technology infrastructure topics were most popular.
-
The millions in cost savings resulted from modernization of legacy technologies and smart financial management, state officials said. New funding in the 2025-2026 budget will strengthen IT and cybersecurity.
More Stories
-
A partnership between Chicago Public Schools, the Illinois Institute of Technology and City Colleges of Chicago allows high-school juniors and seniors to enroll in college courses in pursuit of associates degrees.
-
Lewis and Clark County commissioners have approved seeking a federal grant to replace courthouse cameras not compliant with the National Defense Authorization Act. The devices are considered susceptible to online attacks.
-
Everyday household items like remote thermostats may be vulnerable to hackers, but a new federal program hopes to identify and label which connected products are taking measures to protect your information.
-
In the midst of an election year, evolving AI has in part led to a massive spike in deepfake-powered disinformation, but at a recent Brookings event, experts discussed how lawmakers and officials can play defense.
-
While new artificial intelligence technologies could be used for nefarious purposes such as creating more convincing phishing attacks, experts say the technology might also automate and strengthen IT security protocols.
-
Concerned about foreign spying and hacking, legislators are considering a bill that would ban public agencies in Connecticut from buying “any small unmanned aircraft system assembled or manufactured” in China or Russia.
-
Four months after a similar ballot measure narrowly failed, Duluth School District is asking voters to approve $5.2 million in taxes annually over 10 years for technology, cybersecurity and learning.
-
In this interview with white hat hacker Mishaal Khan, we learn about open source intelligence gathering and how to hack humans — or not.
-
This type of attack involves using face-swapped videos to try to trick online verification systems, but as they rise in prevalence, so too do methods for combating them.
-
The New Mexico Administrative Office of the District Attorneys was still trying to get its main computer servers working Thursday after ransomware locked prosecutors across the state out of files.
-
From the SolarWinds hack to the more recent, serious disruptions of Microsoft and Change Healthcare, cyber attacks on industries that do business with universities create vulnerable points of entry for cyber criminals.
-
A state spokesman says all normal business operations have been restored. Meanwhile, the hacktivist group, Anonymous Sudan, is claiming credit for the attack through statements on its Telegram channel.
-
CISA, which had previously issued warnings about hackers exploiting zero-day vulnerabilities in certain Ivanti products, now says that it has had its own systems compromised.
-
The federal government and the health-care company have announced relief programs after the national impact of last month’s attack. Two services around electronic payments and medical claims are expected to be restored later this month.
-
A $193,981 grant from a business startup program will allow the university to create an interactive app to teach students about online risks, as well as a free training app for police to investigate the dark web.
-
From new laws to the K-12 "SIX Essentials Series," the NIST framework and assessments from the Department of Homeland Security, schools have state backup and abundant resources at their disposal to combat cyber threats.
-
La Mesa, which is near San Diego, has temporarily suspended public comments via Zoom following a rash of antisemitic hate speech during last month's City Council meeting.
-
Many global cyber teams are analyzing cyber defense gaps now that the NIST Cybersecurity Framework 2.0 has been released. How will this guidance move the protection needle?