
Securing Critical Infrastructures
Introducing START—a strategic initiative for state government to prevent ransomware and cyber breaches, protect critical infrastructures, and prepare for quantum computing threats.
States Under Siege
State governments are facing an escalating wave of cyber threats, driven by a surge in targeted attacks that exploit fragmented infrastructures, outdated access controls, and under-resourced IT teams. Ransomware and cyber breaches are increasingly disrupting essential services—from emergency communications and public safety systems to transportation networks. The imminent threat of quantum computing deepens the risk.
The impact to state government and critical infrastructures is catastrophic and far-reaching—threatening national security, public safety, civilian services, and economic stability.​

​Stolen and compromised credentials remain the top attack vector in cyber breaches across government and industry, yet the focus of cybersecurity tools is on detecting attackers once they've infiltrated and using AI to speed response. This must change.
Since January, cybersecurity experts have seen Chinese hackers exploiting CVE-2025-0994, a vulnerability impacting Cityworks—a tool used by local governments to manage critical infrastructure assets. Initial access was achieved through stolen password-based credentials, allowing attackers to authenticate and trigger the vulnerability. ​​​
The cyberattack on North Miami began with stolen login credentials that provided unauthorized access to Mayor Alix Desulme’s personal Gmail account. This served as the foothold—allowing attackers to infiltrate the city's IT infrastructure and deploy ransomware that disrupted multiple municipal services, including police dispatch systems and online payment portals.
Despite billions spent on solutions, data breaches and ransomware continue to escalate. There is no security—only the illusion of it. START was developed to provide a strategic plan for states to implement security systems that stop threat actors before they breach systems and infrastructures. Learn more....