This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
This has prompted warnings from federal agencies, including the FBI, National Security Agency and the Cybersecurity and Infrastructure Security Agency. Communities in Kansas, Pennsylvania and Texas also experienced disruptions to water systems after cyberattacks within the past year. Most hackers are motivated by…
Many agencies have adapted to this reality by orchestrating security solutions suitable for a distributed workforce. According to Gartner, government agencies should integrate security tools under centralized management to gain maximum collaboration between their platforms. Vince Hwang, senior director of cloud security and…
Now, eight years in, he continually works to bolster security and resiliency to prevent any tech-related turbulence. Knowing this, CIO Eduardo Valencia charted a course toward more robust IT operations when he joined the Metropolitan Airports Commission, which runs MinneapolisSaint Paul International Airport (MSP). Were dealing with
Cities and counties have started deploying servers and data centers at the network’s edge in support of everything from water infrastructure to real-time traffic controls, power grid management and more. By moving compute instances close to data sources, they’re able to deliver real-time analytics and other key capabilities.
Physical security will continue to be a top priority for state and local government IT decision-makers in 2025, especially as digital technology becomes more deeply embedded in the protection of people, property and physical assets.
But 9 times out of 10, what we’re really talking about is Software as a Service, especially among state and local government agencies that don’t necessarily have the in-house staff to develop, manage and secure their own apps in the cloud.
A multicloud environment offers numerous benefits, including a high degree of scalability and flexibility, but it also presents security challenges. State and local government IT leaders should consider these four steps to remove complexity from their cloud security environments and keep resources safe from attack.
In Cobb County, Ga., outside of Atlanta, members of an organized theft ring ran out of a store with armloads of expensive athletic wear, hopped in a getaway car with a covered license plate and sped off out of the countys jurisdiction.
Agencies need to confront the growing problem of shadow artificial intelligence through policy updates and the implementation of new security measures. Microsoft and LinkedIn found 78% of AI users bring their own tools to work, and 52% are reluctant to admit using it, according to the 2024 Work Trend Index Annual Report.
These attacks impact the security of sensitive data and can also cost millions of dollars — at a time when states and cities are already facing tight budgets. State and local governments face cyberthreats that are expanding at an alarming rate. Since last year, cyberattacks against local governments increased by 70 percent.
These two issues are closely connected: As states pursue ways to offer new services to citizens and improve current ones, they also face greater security challenges. The nature of state government IT operations can create additional security challenges.
The prank sounds harmless enough: High school students wait until dark, pour soap into a public fountain and laugh as it fills up with bubbles. But when it happened 17 times in one year ruining several $30,000 pumps and requiring a two-day cleanup process each time city officials in Opelika, Ala.,
A security operations center, or SOC, can be the nerve center of a strong state and local cybersecurity effort. SOC teams are charged with detecting, preventing, investigating and responding to cyberthreats, ideally with round-the-clock monitoring of an organization’s network. That’s a lot for any state office or agency to take on.
New Jersey Judiciary CIO Jack McCarthy was faced with a challenge: how to ensure these newly remote workers could securely access sensitive systems using legacy architecture. McCarthy turned to solutions from Zscaler and started to forge a path toward zero-trust security.
The Criminal Justice Information Services Division of the FBI provides security guidance to federal, state and local law enforcement agencies accessing criminal justice information currently or previously managed by the bureau.
As state and local government agencies modernize IT infrastructure to support hybrid work environments and cutting-edge citizen services, they also find themselves having to secure access to a mix of modern and legacy systems. Enter identity and access management.
The reality is that government networks may have a lot of connected equipment that IT staff dont manage or care about, which can create headaches for security teams. Ideally, in such situations, the security team will tell IT that if an asset is on the network, it needs to be in a configuration management database.
The colocation provider handles cooling, building security, network connectivity, environment monitoring, maintenance and power infrastructure. While state and local agencies may have their own data centers, colocation offers an alternative. With colo, government entities fill rented space with their own IT equipment.
In fact, in fiscal 2023, agencies reported more than 32,000 cyber incidents to the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, a jump of almost 10 percent over the number disclosed in 2022. “Risks to our nation’s essential technology systems are increasing.”
Previously, the governor established the state’s first Joint Security Operations Center and based it in Brooklyn. In June 2022, New York Gov. Kathy Hochul appointed Colin Ahern as the first chief cyber officer for the state.
Securing data centers is of prime importance to state and local governments as they seek to modernize their IT infrastructure and take advantage of technology refreshes to support their distributed workforces. Three important avenues are identity and access, the digital infrastructure, and security processes and technologies.
State and local government teams are constantly thinking about how to improve customer service. Making things more efficient, reducing barriers to doing business with agencies, simplifying paperwork and moving to online processes wherever possible are all top-of-mind strategies for managers who want to deliver better constituent services.
Security fragmentation remains a significant challenge for departments managing hybrid cloud environments because their agencies often own independent on-premises and cloud infrastructure. Failure to align this infrastructure results in inconsistent security policies, visibility gaps and access management issues.
From voter registration databases to electronic voting machines, our election infrastructure is in hackers’ crosshairs, and hardening it is a matter of national security. As we race toward Nov. 5, state leaders must consider cybersecurity’s role in safeguarding election integrity.
When Shane McDaniel, the CIO of Seguin, Texas, walks out to his truck after work, it’s not uncommon for someone in the parking lot to shout: “Nice try, Shane — I didn’t click on it!”
Neglecting regular patch management can create gaping security holes, leaving agencies susceptible to malware, ransomware and other attacks. Ignoring updates to software and operating systems that prevent exploitation of known security flaws can prove devastating both operationally and financially. million in 2023
With election security a top concern, Arctic Wolf commissioned the Center for Digital Government to survey over 130 state and local government leaders about their perceived state of readiness. Spoiler alert: They don’t feel ready.
30, 2024, shortly after introducing its first information security policy. As part of its risk management plan, the county also joined StateRAMP for its standardized security certification of cloud vendors. Arapahoe County, Colo., adopted its first cyber incident response plan Sept.
In January, a cyberattack against water utilities in small Texas towns caused water to overflow in the city of Hale Center. There were 37,000 attempts in four days to log in to our firewall,” Mike Cypert, city manager of Hale Center, told the Associated Press.
Federal civilian agencies understand that artificial intelligence will be increasingly useful in streamlining and automating complex workloads. They hope to use data-driven insights to enhance decision-making and address thorny problems.
Cybersecurity and Infrastructure Security Agency provides some starting points for doing so in its #Protect2024 campaign. As the 2024 election season continues, local jurisdictions administering voting sites should seek to ensure strong cybersecurity for their organizations. Here are six steps recommended by CISA.
According to the most recent Rubrik Zero Labs report, “The State of Data Security: Measuring Your Data’s Risk,” 94 percent of IT and security leaders reported that their organizations experienced significant cyberattacks last year; one-third of these victims endured at least one ransomware attack.
The State Department’s law enforcement arm, the Bureau of Diplomatic Security, defends the department and the foreign affairs community by applying cybersecurity, technology security and law enforcement expertise to help advance U.S. foreign policy and safeguard national security interests.
Agencies looking for solutions to support their security operations centers will likely come across three proven tactics that can help governments stay secure and protect citizen data: Security information and event management (SIEM) Security orchestration, automation and response (SOAR) Extended detection and response (XDR) Each of these centralized (..)
Recent research has found that attacks against governments worldwide increased by 1,885 percent in 2021, and the Cybersecurity and Infrastructure Security Agency has highlighted ongoing threats to state facilities such as water and wastewater systems.
The value of citizen data is gold for planning secondary attacks, and cybercriminals know that many local governments are underfunded and understaffed when it comes to IT security, which makes them tempting targets for ransomware.
Lets explore agentic AI, its benefits and how implementing it on-premises can help with data control and security. Agentic AI AI systems that act autonomously to access and synthesize relevant information is poised to positively impact government agencies ability to deliver quality citizen services efficiently.
The Cybersecurity and Infrastructure Security Agency launched its first public service announcement recently with a short video that reminds the public to use basic cybersecurity protections to keep themselves safe online. “We We want to make keeping information safe a habit, just like buckling a seat belt,” said CISA Director Jen Easterly.
Cybersecurity and Infrastructure Security Agency reported that international adversaries were discovered on U.S. Critical infrastructure, crucial to our everyday lives, could fall victim to malicious activity from hackers. In February, the U.S. critical infrastructure networks, where they had remained undetected for up to five years.
That is the guidance from the White House’s Office of the National Cyber Director (ONCD), which unveiled its Roadmap to Enhancing Internet Routing Security on Sept. Border Gateway Protocol, a data routing framework developed in 1989 on the premise that all routed contents could be trusted, can no longer be trusted.
Isolated recovery environments with immutable data vaults provide the highest level of security and recovery against That leaves crooks without a way to extort your organization, and that means no payouts for ransomware attacks.
Department of Homeland Security, through the Cybersecurity and Infrastructure Security Agency and the Federal Emergency Management Agency, announced a first-of-its-kind cybersecurity grant program for state, local and territorial (SLT) governments across the country. In September, the U.S.
As far back as 1996, when Phrack magazine published an article by the hacker Aleph One titled “Smashing The Stack For Fun And Profit,” the world has known about memory safety vulnerabilities and how malicious actors can exploit them. Now, the the Cybersecurity and Infrastructure Security Agency and cybersecurity authorities…
We organize all of the trending information in your field so you don't have to. Join 40,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content