Critical Infrastructure

Maryland Gov. Hogan signs three cybersecurity bills

by • 2 weeks ago

The new laws solidify the position of the state's CISOs, establish new offices and set new requirements for critical infrastructure.

Critical infrastructure threats raise new questions for state CISOs

by • 1 month ago

Several state CISOs said potential Russian cyber activity against critical infrastructure in the U.S. is stirring uncertainty.

North Carolina cyber chief says new recognition for task force will improve its reach

by • 2 months ago

"Having the formal recognition is extremely valuable," Rob Main, the state's chief risk officer, said of a recent move by Gov. Roy Cooper.

North Carolina formalizes cybersecurity task force

by • 2 months ago

Gov. Roy Cooper signed an executive order establishing an incident-response effort that draws on state and local cyber professionals.

Education Dept. hasn't updated K-12 cybersecurity plans since 2010, audit finds

by • 6 months ago

Congress' investigative said the Education Department needs to consult with CISA about updating its planning documents, but the department replied that its role is limited.

Midwest's grid security to get boost from NSA-backed research group

by • 7 months ago

Researchers at Iowa State University and the University of Illinois have a $2 million NSA grant to study the cybersecurity of the region's energy sector.

Biggest cybersecurity issue is 'culture,' city CISOs say

by • 7 months ago

Getting people comfortable with new controls is one of the greatest hurdles to improving security, local cybersecurity leaders said during an online event.

States can play greater role in shaping grid cybersecurity, NGA says

by • 1 year ago

Many states have created dedicated task forces and other bodies focused on protecting power utilities from cyberattacks, a new NGA report shows.

UT San Antonio gets CISA grant to develop high-value asset cybersecurity

by • 1 year ago

The $1.2 million grant will be used to develop guidance for state and local authorities to identify and protect their most important IT systems.

TwitterFacebookLinkedInRedditGmail