Oakland County Improves Service and Decreases Costs with Okta
Oakland County, Michigan, is one of the largest counties in the United States and according to the Center for Digital Government, it’s also one of the most technologically advanced. To get there, the county needed to re-architect an infrastructure made...
Russian national Aleksandr Zhukov has been convicted by a U.S. federal jury of four charges - including wire fraud and money laundering - as part of the so-called Methbot scheme, which prosecutors say led to $7 million in digital advertising fraud.
Does the West want to have its digital existence defined by adversaries, or is it ready to devote the time, resources, expertise and planning required to more fully take control of its evolving destiny? That's the techno-Darwinian call to arms issued by Jeremy Fleming, the director of Britain's GCHQ intelligence...
How much does it cost to recover from a ransomware attack? For the Scottish Environment Protection Agency, which was hit by the Conti ransomware-wielding gang on Christmas Eve, reported cleanup costs have reached $1.1 million. SEPA is still restoring systems and has refused to pay any ransom.
A Swiss national who recently highlighted flaws in Verkada surveillance cameras has been charged with criminal hacking by a U.S. federal grand jury and accused of illegally accessing and leaking data from numerous organizations, apparently including Intel, Nissan and the U.S. National Reconnaissance Office.
Although CISA has made significant strides since it was established in 2018, the agency still has important work to do to fulfill its cybersecurity and national security obligations, the GAO finds. This includes better communications with industry partners that share responsibility for critical infrastructure.
Software is at the center of it all, placing increased pressure on developers, security managers, and DevOps leaders to develop applications faster. However, this need for speed comes at a price, and security can be seen as a blocker and not an enabler. Watch this webinar to understand why it's time to prioritize your...
The Cybersecurity and Infrastructure Security Agency will take over the day-to-day management of the official .gov top-level domain in April, adding a greater emphasis on security for the domains used for government websites.
Public sector organisations worldwide face a
daunting set of challenges as society adjusts to
the current COVID-19 environment. Whether it is
local government, healthcare, law enforcement,
or blue light responders, organisations across all
disciplines that previously depended on in-person
processes have been...
Cyber security has become a war of attrition where organizations, government agencies and the Department of Defense (DoD) are facing new threats every day. But years of poor IT hygiene have limited their visibility into the IT infrastructure. This is not only opening doors into the network for cyber criminals, but it...
A lack of centralized leadership, especially at the White House level, is hindering the federal government's ability to address numerous cybersecurity issues, including the SolarWinds supply chain attack that affected federal agencies and others, according to a new GAO report.
French cybersecurity authorities are warning that widely used, open-source IT monitoring software called Centreon appears to have been hit by Russian hackers. But unlike the SolarWinds supply chain attack, in this campaign, attackers appear to have hacked outdated, unpatched versions of the software.
The ongoing lockdown may be complicating the path of Cupid's arrows. But as another Valentine's Day rolls around, authorities are warning that romance scammers - and other types of fraudsters - are alive and well and have been increasingly preying on unsuspecting victims around the world.
It is essential that government organizations and the private sector bodies in their supply chain have the
right solutions in place to minimize the risk of data loss in the public sector. Systems for data classification
and data loss prevention allow organizations to effectively control and manage data and ensure...
While many details about the SolarWinds Orion hack and full victim list remain unknown, experts have ascribed the apparent espionage campaign to Russia. Now, however, Reuters reports that a separate group of Chinese hackers was also exploiting SolarWinds vulnerabilities to hack targets.