-
How can we describe the past year in cybersecurity? No doubt, AI was front and center in so many conversations, and now there’s no going back. Here’s why.
-
The document emphasizes governance, risk assessment and safety principles to protect operational technology as AI adoption grows. Understanding security concerns during development is one recommendation.
-
The renewal of a state grant program for local public agencies focuses on cybersecurity and other areas that involve gov tech. Officials encourage governments to partner on projects that could receive funding.
More Stories
-
Computerized in-vehicle systems for police are still not up, and residents are unable to pay utility bills online. The cybersecurity breach, detected Aug. 4, shuttered City Hall for nearly a week.
-
The project, which is called UnDisruptable27, wants society to prepare for near-future geopolitical conflicts in which cyber attacks are aimed at Americans’ access to water, medical care, power and food.
-
The Minnesota-based group has begun sending letters to patients whose information may have been accessed during a large cyber attack in February. The attack may have impacted data from as many as 1 in 3 Americans.
-
Two major Texas universities will co-lead one of five SECURE (safeguarding the entire community of the U.S. research ecosystem) centers dedicated to protecting intellectual property from foreign access.
-
In a talk at the Las Vegas event, an independent security researcher discussed the Nebraska Supreme Court’s software and website. The court was notified prior to the event, and nothing bad has happened as a result of the vulnerability.
-
If adopted, the treaty would be a major step in creating global consensus on combating cyber crime. The agreement would empower international cooperation, but it has also sparked human rights concerns.
-
A community college in Kentucky recently received $650,000 from the National Science Foundation and a redesignation as a Center for Academic Excellence in Cyber Defense (CAE-CD).
-
For his final project in a nonprofit management course, a student majoring in cybersecurity created Digital Defenders Inc. to make people aware of the ways that can be exploited online.
-
Carter Schoenberg is a trusted security expert who has vast experience in the public and private sectors. Here’s his guidance on what works and what doesn’t with the cybersecurity industry.
-
There are two cyber conferences in Las Vegas over the next several days, with those being the Black Hat USA convention and Def Con 32, the longest-running hacking conference in the United States.
-
As other military branches have broadly struggled to hire, train and retain cybersecurity talent, some say that the solution is adding a U.S. Cyber Force dedicated to digital defense.
-
Some ransomware actors aren’t just stealing data and encrypting files — they’re also searching for damaging information, threatening violence and trying other techniques to amp up pressure on victims.
-
The state’s second most populous county has created the force after a roundtable discussion by county IT leaders last week. The move is in response to the general ramping up of cyberattacks.
-
Secretary of State Steve Hobbs cautioned voters to be wary of election misinformation, in a news release Monday, calling on them to rely on established news outlets and official government institutions.
-
The city-county is recruiting for a chief information security officer; a recruitment for a chief data officer is expected to follow. The restructuring is intended to reflect the significance of each area.
-
Researchers at the Kentucky university have garnered attention this year for studies about how artificial intelligence could prevent cloud computing attacks, and how LLMs could respond to health care challenges.
-
CrowdStrike has taken a strike back against Delta Air Lines, after the carrier said it plans to pursue legal claims to recover its losses from a huge technology outage last month.
-
A new report from the Government Accountability Office released this week calls for a more thorough approach to improving cybersecurity for water and waste water systems nationwide.