A new report from cybersecurity firm Recorded Future found that ransomware attacks against state and local governments are on the rise.
Rhode Island residents hit by cybercrime have a new place to turn to for help. Beginning today, Rhode Islanders can now dial 2-1-1 to report cybercrime, including online fraud, and receive help with the aftermath, such as re-securing electronic devices.
In honor of World Password Day on May 2, OneLogin released a new report on corporate password practices.
Federal CIO Suzette Kent met with members of the National Association of State Chief Information Officers (NASCIO) today to discuss strengthening the partnerships between Federal and state governments.
North Carolina Attorney General (AG) Josh Stein is urging the Federal Communications Commission (FCC) to adopt new rules proposed in the agency’s FY2018 appropriations authorization bill that deal enforcing rules against caller ID spoofing on calls originating overseas. and spoofing using alternative voice and text messaging services.
California’s Los Angeles County – the largest voting district in the United States – has decided to tackle election security on its own by building custom voting machines.
On Monday, Senator Bob Menendez, D-N.J., announced a bill to provide funding to states to safeguard voting systems from cyberattacks. Citing the Robert Mueller report, Menendez demanded that Congress act to secure election infrastructure from foreign adversaries like Russia, Iran, China, and North Korea.
Panelists representing consumer privacy perspectives discussed an array of strategies for approaching data privacy protection laws at a hearing before the Senate Commerce, Science, and Transportation Committee today.
The National Institute of Standards and Technology (NIST) released a discussion draft version of the upcoming NIST Privacy Framework on Wednesday, May 1, with principles and practices aligned with the NIST Cybersecurity Framework.
Distributed denial of service (DDoS) attacks are becoming significantly more frequent and voluminous as attacks have become multi-vectored and transformative over time, according to an April 24 Neustar whitepaper.