Tags North Carolina

North Carolina IT agency embraces failures to change culture

by • 4 days ago

Leaders of the North Carolina Department of Information Technology changed their internal culture by embracing their failed projects, the state's "chief solutions officer" said at the Red Hat Government Symposium.

North Carolina municipalities get state’s help on ransomware protection

by • 5 days ago

State CIO Eric Boyette says North Carolina’s cybersecurity resources are being deployed to aid local governments where they’re needed most.

How mapping tools are improving school safety in North Carolina

by • 2 weeks ago

Applications for risk management planning and mapping are helping state officials coordinate with school administrators and better understand their facilities.

Fun and games can raise cybersecurity awareness in state government

by • 3 weeks ago

North Carolina's capture-the-flag exercise is extending cybersecurity concerns beyond the office of the chief information officer.

NASCIO awards top state IT projects and officials for 2019

by • 1 month ago

State projects to map schools and track sexual assault kits were honored alongside three top state technology officials.

NASCIO report projects AI growth in cybersecurity, digital services

by • 1 month ago

State officials say cybersecurity, fraud detection and other digital services are primed to benefit most from advances in artificial intelligence.

NASCIO announces new leadership, cybersecurity awards

by • 1 month ago

North Carolina CIO Eric Boyette will serve as the organization's president, succeeding Delaware CIO James Collins.

North Carolina’s election-security drills were 2020 preparation

by • 1 month ago

State CIO Eric Boyette said the cross jurisdictional exercises are one piece of an extensive cybersecurity program running throughout the state.

As 911 goes digital, security and training pose major challenges

by • 2 months ago

Today's aging, analog 911 systems are largely insulated from cyberattacks. But soon they'll be plugged into everything else that gets hacked.