The Future of Security
Research has found that computer models can predict the likely fate of proposed legislative amendments and the most effective pathways for lobbyists. This technology mixed with micro-legislation could muddle transparency.
The state Legislature has continued its use of virtual sessions to allow virtual participation in the legislative process. But as Zoombombing occurrences have increased in recent weeks, some are reconsidering the access.
The school district revealed that thousands of student records, including some of current students, were posted to the dark web as the result of a recent cyber attack. The information included driver’s license and social security numbers.
All over the country, state agencies and people who receive aid through the Supplemental Nutrition Assistance Program, commonly known as food stamps, are reporting the theft of millions of dollars in benefits.
The legislation would limit use of facial recognition to investigations of certain violent crimes, human trafficking offenses or ongoing threats to public safety. If passed, it would be the state’s first limitation on the tech.
The second-largest appraisal district in the state struggled for 72 days after their computers, emails and website were hacked on Election Day. The district is now increasing its cybersecurity safeguards.
Online chatter and ongoing harassment suggest that security concerns will persist, if not increase, ahead of the next election cycle. Resources are being offered to help election officials cope with this new reality.
State Sen. Barry Finegold used the artificial technology software to draft a bill that would regulate generative AI models and would require companies to obtain “informed consent” from individuals before using, collecting or disclosing their data.
The California county has terminated its use of Dominion Voting Systems over widely debunked claims of mass voter fraud. The state only has three voting systems it allows its counties to use and it is unclear which one Shasta will select.
Immigration and Customs Enforcement officials released 3,000 immigrants after accidentally posting personal data of more than 6,000 immigrants onto the agency’s website last November. Those still in custody will have their cases reviewed.
The airport and Customs and Border Protection will begin using scanners to collect and store biometric data from all foreign nationals entering and exiting the U.S., excluding Canadian citizens.
The town will not add the surveillance tech into its street security cameras installed this year after concerns about the technology’s reliability and privacy. Many say the software is discriminatory against people of color.
The massively popular platform owned by the Beijing-based company ByteDance, has already been banned on government-owned devices in several U.S. states because of security concerns.
The Legislature’s auditing firm found “significant weaknesses in several security control areas” across the 20 government agencies that were audited, putting the state at greater risk of cyber attacks and other security incidents.
A group has filed a lawsuit against Immigration and Customs Enforcement for allegedly spying on wire transfers of more than $500 to or from California, Arizona, New Mexico, Texas and Mexico without probable cause or warrant.
A new report from Parents Together lists a diverse array of toys and gifts that collect user data to sell to third parties, including a water bottle and smart mirror. The report acts as more of a warning than a comprehensive list.
Nearly 1,700 state and local entities purchased tech targeted under the FCC’s ban between 2015 and 2021. A new rule lets existing tools stay, but reduces future availability, potentially leading to costlier procurements in the name of national security.
Cyber incidents have hit state courts in Alaska, Georgia and Texas in recent years. Court leaders and CIOs at the NCSC eCourts conference this week shared what happened and what they learned from the experiences.
Gov. Larry Hogan has barred executive agencies from using the social media platform and other “Chinese and Russian-influenced products and platforms” due to cybersecurity risks, according to an emergency directive.
The case alleges that the tech giant has been capturing and selling data from Louisianans, violating the state’s consumer protection and privacy law. A similar lawsuit was settled earlier this year in Illinois for $100 million.
The city’s police department spent the money on surveillance technology between 2007 and 2019, but listed the expenditures as “special expenses.” Some argue the department is not meeting disclosure requirements.
The state’s law imposes sweeping restrictions on Internet companies that serve minors by requiring that they design platforms with children’s well-being in mind. The law will go into effect in 2024.
For many, fears about the election technology being the cause for concern have diminished. Now security experts worry about a physical assault on election systems, either an attack on the machines or people.
Auditors revealed that the cyber attack led to money being misappropriated but that port officials have been able to recover approximately $250,000 through insurance so far. The agency has since received federal aid to boost security.
North Carolina CIO Jim Weaver and former Washington CISO Vinod Brahmapuram explain obstacles and tips and tricks for states looking to better collaborate with local partners and extend cybersecurity support statewide.
The data tool enables law enforcement officers to see “patterns of life,” where and when people work and live, with whom they associate and what places they visit.
CISOs are gaining attention outside the IT office and cyber funding isn’t a top challenge — for the first time in survey history. But CISOs still wrestle with talent gaps and need to strengthen local relationships to build whole-of-state approaches.
When state and local government suffers a cyber attack, officials are faced with a dilemma: How much is the public entitled to know? How much can you reveal while keeping systems secure?
The Georgia county will amend its relationship with Konnech, whose founder was recently arrested for allegedly stealing poll worker data, to ensure voting information is stored securely on servers controlled by the county.
With the 2022 midterms looming, elections officials around the country are working to keep false claims out of the headlines, push for free and fair elections, and foster constituent trust in the process.
Keeping up strong data breach defenses is tricky as technologies evolve and governments adjust to hybrid environments. Maricopa County CISO Lester Godsey explains why data inventorying, vendor risk management and cybersecurity audits are key.
Most Read