The Department of Energy’s (DoE) Office of Cybersecurity, Energy Security, and Emergency Response (CESER) has announced $15 million in funding to establish six university-based electric power cybersecurity centers that will foster collaboration across the energy sector to address gaps in energy security research and provide cybersecurity education programs. 

The U.S. Department of Education, in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), officially launched the Government Coordinating Council (GCC) for the Education Facilities Subsector on March 28 to better support K-12 cybersecurity efforts.

broadband

Connecticut is using $41 million in funding from the American Rescue Plan Act Capital Project Fund to expand broadband infrastructure and improve internet connectivity in the state.

As more states are prioritizing the role of data privacy, the state chief privacy officer (CPO) role is continuing to grow in importance, according to a recent report from the National Association of State Chief Information Officers (NASCIO).

Following the discovery of a Chinese-based hacking group compromising U.S. critical infrastructure, the White House – in collaboration with the Environmental Protection Agency (EPA) – announced plans this week to form a Water Sector Cybersecurity Task Force.

The California Department of Transportation (Caltrans) has launched a new equity tool that is designed to help ensure all Californians benefit from transportation projects, and identify communities most negatively impacted by the transportation system which can result in high rates of traffic, crashes, and air pollution, as well as limited transit options.

In today’s digital era, public sector IT departments are at the forefront of innovation, tasked with delivering complex services under the watchful eye of budget constraints, regulatory demands and the ever-evolving needs of the public. As IT leaders, navigating these challenges requires a blend of strategic vision and practical solutions. From cybersecurity threats to legacy […]

1 2 3 4 5 39