-
The funding, destined for Warren and Washington counties and the village of Hudson Falls, comes from the Homeland Security program. Its uses include advancing cybersecurity capabilities.
-
Pamela McLeod will take over that top tech job in just more than one week. She has public-sector experience and will help build the state’s whole-of-cybersecurity approach to digital defense.
-
Google recently released important research that moves Q-Day — the day quantum computers will be able to “break the Internet” — up to 2029. How should enterprises secure their systems?
More Stories
-
Ivanti, which has verified the cybersecurity issues with its own investigation, is working to release patches and mitigations, but in the meantime there are precautions that users can take.
-
The nonprofit Internet Safety Labs found that exposure to trackers and behavioral ads on school devices vary by race and income, and often the source of the problem is the school’s own official website.
-
Using over $3 million in grant funding from the NSF, the university will establish a new CyberCorps Scholarship for Service program to train cybersecurity professionals to work with AI and machine learning tools.
-
Lawmakers in the Pennsylvania state house recently met with representatives of municipal governments, industry and academia last week to discuss cybersecurity threats to vital systems and infrastructure.
-
Using a script, the scammer contacts an individual, typically through a dating or social media app or via phone calls and text messages that are meant to appear to have been misdialed.
-
While digital devices have brought accessibility and flexibility to education, educators should also warn about their potential for causing annoying and even dangerous distractions, surveillance or ethical problems.
-
A June 2023 hack of the city of Fort Worth’s website may have leaked more information than initially thought. A review by an outside firm revealed hackers may have accessed driver’s license numbers, dates of birth and more.
-
Portions of the Unified Judicial System portal — a public database providing access to criminal and civil docket sheets and schedules for upcoming court appearances — are unavailable.
-
Looking for a handbook for teaching the cybersecurity body of knowledge in a conventional classroom setting? Read this book by Daniel Shoemaker, Ken Sigler and Tamara Shoemaker.
-
SETDA, CoSN and 10 other nonprofits or professional associations applaud the Federal Communications Commission’s initiative but ask the federal agency to protect sensitive data during the pilot.
-
The 17-day trial questioning the security of Georgia’s Dominion voting machines ended Thursday, leaving the final decision in the hands of U.S. District Judge Amy Totenberg.
-
Cyber attacks continue to threaten U.S. courts, but an event series slated for later this year aims to help judicial officials prepare for and recover from cyber incidents.
-
An internship program with a regional cybersecurity company helped Cañon City High School in Colorado build a team for the CyberPatriot National Youth Cyber Defense Competition.
-
Today, Kansas Gov. Laura Kelly announced the appointment of John Godfrey to take the role of state chief information security officer. Godfrey takes over for Jeff Maxon, who was recently appointed to a new position.
-
Groton Public Schools was offline Thursday following a cyber attack on its main servers. The technology director said the source of the attack has been identified, and connectivity was 90 percent restored by the end of the day.
-
At least two lawsuits have been filed over a data breach at Singing River Health System that compromised the personal information of 250,000 or more employees and patients, attorneys claim.
-
Jill Fraser, who was serving as the interim chief information security officer after the departure of Ray Yepes, has been selected to serve as the state's permanent CISO. She brings more than a decade of experience in a similar role.
-
Gov. Josh Shapiro’s administration is bringing in a specialized IT consultant to implement additional layers of control to data center protocols following a substantial data loss incident earlier this month.
Most Read