-
The funding, destined for Warren and Washington counties and the village of Hudson Falls, comes from the Homeland Security program. Its uses include advancing cybersecurity capabilities.
-
Pamela McLeod will take over that top tech job in just more than one week. She has public-sector experience and will help build the state’s whole-of-cybersecurity approach to digital defense.
-
Google recently released important research that moves Q-Day — the day quantum computers will be able to “break the Internet” — up to 2029. How should enterprises secure their systems?
More Stories
-
The auditor’s budget was cut after its refusal to join a countywide cyber program and contribute $1 million from its real estate assessment fund to help mitigate the cybersecurity costs.
-
Lawmakers in the Magnolia State are considering bills to make the state CIO a cabinet member, mirroring a national trend of CIOs evolving from tech managers to enterprise leaders — and to create a cybersecurity department.
-
Amid a wave of IT leadership promotions, the state lifted the acting tag from four total positions, the others being executive deputy CIO, chief of staff to the CIO and executive director of CODE PA.
-
School and college administrators are among hundreds of attendees at this week's TEEX Cyber Readiness Summit, exploring a wide range of topics from AI and security to identity theft and human firewalls.
-
John Cook, outgoing president of Springfield Technical Community College, said rising enrollment numbers are making the college's Security Operations Center more sustainable.
-
The 2026 Technology Innovation and LEAD Awards recognized K-12 districts and leaders for systemwide technology initiatives touching everything from blended learning to AI training and school board collaboration.
-
Bryce Bailey, deputy state CISO, has been tapped to be interim CISO in the Cornhusker State following the departure of Abby Eccher-Young. The state is also looking to hire a new chief data officer.
-
Tulsa International Airport recently suffered a ransomware attack, a spokeswoman confirmed. The facility is independent of the city of Tulsa, which suffered its own such incident in early 2019.
-
City officials are trying to determine the full extent of systems impacted by a ransomware attack, which paralyzed phone and computer systems in multiple departments beginning early Wednesday.
-
LSU will work with Argonne National Laboratory in Illinois and Oak Ridge National Laboratory in Tennessee as a “bridge” between national energy research and the implementation of research findings on the Gulf Coast.
-
As federal and state governments extend their lists of banned foreign technologies, where is this trend heading next? Is your home network safe for work use?
-
Chief Privacy Officer Martha Wewer reviewed the state’s approach to data protection, AI oversight and consumer privacy on Thursday as Gov. Josh Stein marked a new day of awareness during Data Privacy Week.
-
There was a record set for data breaches in 2025, and the incidents were also paired with fewer details in notification letters, raising concerns about transparency and public understanding.
-
Following a turbulent year in cybersecurity, the state Governor’s Technology Office is seeking to hire a new cybersecurity lead to manage risk and compliance. Nevada’s permanent CISO retired in May 2025.
-
An ambulance billing company has agreed to pay Connecticut and Massachusetts $515,000 for a 2022 data breach that exposed private information of nearly 350,000 residents, officials said.
-
The nonprofit advisory group GovRAMP reports that its Progressing Security Snapshot Program leads to steady cybersecurity improvements for cloud service providers who sell to government, ultimately boosting trust.
-
The National Association of State Chief Information Officers’ list reflects pressure on states to manage cyber risk, modernize systems and implement AI responsibly — with federal partnership playing a central role.
-
Following an internal audit by the city technology office, leaders said they have removed an unknown account that had gained access to confidential legal files. An IT analysis is underway.
Most Read