-
How can we describe the past year in cybersecurity? No doubt, AI was front and center in so many conversations, and now there’s no going back. Here’s why.
-
The document emphasizes governance, risk assessment and safety principles to protect operational technology as AI adoption grows. Understanding security concerns during development is one recommendation.
-
The renewal of a state grant program for local public agencies focuses on cybersecurity and other areas that involve gov tech. Officials encourage governments to partner on projects that could receive funding.
More Stories
-
The editorial board of the Pittsburgh Tribune-Review commends the college for being open with the public about a recent ransomware attack and shutting down classes Monday and Tuesday to be safe.
-
The world seems focused on new developments in artificial intelligence to help with a wide range of problems, including staffing shortages. But will AI help or harm security teams?
-
Wapello County, Iowa, has taken strides in ensuring that its employees are training on cybersecurity, but the county still has work to do, as it falls below an 80 percent compliance rate.
-
Officials in Lake County, Ohio, have investigated a data breach attempt during primaries in May. Although the hackers didn't steal any useful information, the incident caught the attention of state and federal eyes.
-
The Illinois school's computer network, including phones, email and applications, went down early this morning due to a ransomware attack, prompting administrators to close campus for the day.
-
Users’ personal data is constantly at risk of being stolen. But if you feel things have gotten worse, it's not your imagination. As the pandemic moved more people online, cyber criminals took notice.
-
A University of Massachusetts Amherst professor is collaborating with Gizmodo, the American Civil Liberties Union and other universities to make the Facebook Papers available to the public.
-
The Ohio House of Representatives voted in favor of the Ohio Computer Crimes Act, which, among other things, will allow for faster prosecution of cyber criminals by removing the need to calculate damages to victims.
-
The Coalition of City CISOs aims to fill a professional networking gap by helping CISOs of cities and counties share advice and threat intelligence, and presents the local perspective to federal partners and policymakers.
-
Most states don't mandate that their agencies report any cyber incidents that occur. However, a new legislative trend shows that state lawmakers are gradually recognizing the importance of incident reporting.
-
A new report from the Government Accountability Office calls for the U.S. Department of Education to work with CISA on updating cyber threat response plans for K-12 schools that are more than a decade old.
-
As global travel returns, airline rules, checks and tests are hard to track. But get ready for more as travel returns for the holidays and 2022. Here’s the latest.
-
Storing so much personally identifiable information, research and other data, colleges and universities have become frequent targets of cyber criminals. To qualify for cyber insurance, they must have some controls in place.
-
In Nevada, Elko County commissioners have asked the county clerk to consider alternatives to Dominion voting machines, the election technology that the county has been using since 2004.
-
In the near future, residents of Mercedes, Texas, may be able to pay their utility bills using a form of cryptocurrency. The Mercedes City Commission voted for city staff to research the issue further.
-
The federal infrastructure bill may be murkier than it appears. The large piece of legislation seems to include multiple exceptions to the Freedom of Information Act. Some of the exceptions may be illegal.
-
After administrators noticed unusual activity on the university's network on Nov. 11, users started reporting issues with Wi-Fi, email, coursework submissions and other functions, which some have attributed to a virus.
-
The University of Central Florida beat teams from 105 universities in a contest requiring them to build, secure and defend a complex network of systems and devices used by oil companies, electric companies and others.