'Cuba Ransomware' attack disrupts payment provider used by state and local agencies

by • 6 days ago

A successful attack against a widely used payment processing service has prompted state and local agencies to issue breach disclosures in recent days.

Washington CIO Jim Weaver to become North Carolina CIO

by • 7 days ago

Jim Weaver will soon head to North Carolina to take his third role as a statewide c-level technology leader.

Washington state looks to consolidate cybersecurity after data breach

by • 2 weeks ago

A data breach at the state auditor's office is prompting a move away from federated IT security.

Washington CIO says many probably won't return to office

by • 5 months ago

During a CISA online summit, Washington state CIO Jim Weaver said 98% of his employees "love remote work or are fine with it."

San Antonio's R&D League to tackle public health, environment

by • 5 months ago

Next month's two-day event is expected to connect the general public with organizations interested in developing unique ideas to problems ranging from digital access to housing.

Privacy concerns have states taking it slow on contact tracing apps

by • 7 months ago

Some states have built contact tracing apps, but a decades-old manual process is the norm in most places as officials address widespread privacy concerns.

Los Angeles used Signal to plan controversial vehicle-tracking program

by • 8 months ago

Emails obtained by the Los Angeles Daily News show city transportation officials used an encrypted messaging service to discuss a vehicle-tracking program and did not save the correspondence.

Collaboration aided states' cybersecurity during pandemic, but shrinking budgets concern CISOs

by • 8 months ago

The chief information security officers of California and Washington said the pandemic has generated many useful partnerships, but they must also be more vigilant than ever.

Unemployment fraud in Washington linked to health care ransomware

by • 8 months ago

A report from security firm Kroll says hackers used illicit access to a health care organization to file phony claims before detonating a ransomware attack.