A new study released by cybersecurity firm LevelBlue on March 18, 2026, indicates that public-sector organizations are dangerously unprepared for the modern threat landscape. The report, which surveyed 200 tech leaders in state and local government and education (SLED), found that 29% suffered a security breach in the past year, and 46% are seeing a higher volume of attacks. Two critical weaknesses were identified: a lack of readiness for AI-powered attacks and poor visibility into supply chain risks. While 45% expect to face AI-enabled threats, only 28% feel prepared to defend against them. Furthermore, 44% of agencies admit to a lack of full visibility into their vendor and partner ecosystems, creating a massive blind spot for supply chain attacks.
This report analyzes the current security posture of the U.S. public sector (SLED). Key findings include:
The report focuses specifically on the public sector in the United States, including:
These organizations are often under-resourced and manage large amounts of sensitive citizen data, making them attractive targets.
The lack of preparedness has direct consequences for public services and citizen data security.
The report offers several high-level recommendations for public-sector leaders to address these gaps:
Implement continuous security awareness training to help employees recognize sophisticated, AI-enhanced phishing and social engineering attempts.
Develop a program to assess and manage third-party and supply chain risk, improving visibility into vendor security posture.
LevelBlue releases its report on public-sector cybersecurity readiness.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.