Internet Explorer 11 is not supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.
Keeping up strong data breach defenses is tricky as technologies evolve and governments adjust to hybrid environments. Maricopa County CISO Lester Godsey explains why data inventorying, vendor risk management and cybersecurity audits are key.
Steve Nichols, chief technology officer at Georgia Technology Authority, offers his observations and predictions for what's trending and what's to come with regard to cyber incident notification laws.
The U.S needs defined metrics and more data about cyber happenings across the nation, experts say. Otherwise, it’ll struggle to understand which practices and policies are most effective and where to invest more heavily.
Higher ed’s complex array of systems creates a large attack surface, and institutions are likely to pay ransom. Meanwhile, K-12 schools struggle with cyber staffing but more often resist extortion, a global report finds.  
Some rates have more than doubled, and many insurers require new security protections.
It’s increasingly difficult to move about – both in the physical world and online – without being tracked. Often, companies or government agencies can even track personal data without a warrant.
A report from Forbes Advisor found that between 2017 and 2021, 325,291 residents across the state were victims of data breaches, which amounted to more than $3.7 billion in losses. Compromised email was the costliest breach type.
Despite a growing divide between the Democratic and Republican parties, both sides of the aisle can agree on the need for reliable voting technology and protections from bad actors heading into the next election.
Reports of ransomware attacks and phishing emails have grown across the state, with victims paying millions of dollars to online scammers. The FBI says one of the best ways to fight cyber crime is keeping systems updated.
The 52 top jurisdictions in this year's Digital Counties Survey from the Center for Digital Government are using new strategies for cybersecurity, workforce and digital services to move toward the future.
Purchasing cyber defenses, training and insurance are budgeting decisions — and financial officers need number-driven risk models that show them how far each investment may go toward reducing risks of financial losses from cyber incidents.
Local election officials received assurances that security is a top priority and something that is continually adjusted and updated. Officials claim that election integrity is an everyday task, not just on election day.
As cybersecurity continues to concern state governments, many have turned to task forces to address issues such as ransomware, phishing and other threats. But what have they accomplished so far?
Much of the information requested by members of the Spokane County Republican Party is already shared publicly, but some of the petition’s requests are limited by the state’s privacy and cybersecurity laws.
Federal cybersecurity grants are expected “in the coming months,” with CISA still mulling feedback and finalizing. Local governments should use the time to ensure they’re part of any state planning processes.
A report from the U.S. Cybersecurity and Infrastructure Security Agency found the devices have security vulnerabilities that put them at risk for cyber attacks. Other voting equipment may be similarly at-risk.