News & Commentary
Latest Content tagged with Cybersecurity
Page 1 / 2   >   >>
Coordinated Attacks Call For More Sophisticated Cyber Defense
News  |  9/29/2014  | 
Agencies and industry are rethinking how they defend against coordinated attacks by teams of specialized hackers.
FDA Pushes To Improve Medical Device Security
News  |  9/29/2014  | 
Cyber attacks pose a grave threat to the integrity of healthcare services, agency says.
DoE Preps Privacy Standards For Smart Grid
News  |  9/29/2014  | 
Department of Energy has released a set of voluntary privacy recommendations for smart grid owners, operators, and third parties; industry stakeholders have until October 14 to comment on draft.
Shellshock's Threat To Healthcare
Commentary  |  9/29/2014  | 
The Bash bug is everywhere, including in medical devices. The industry must be better prepared to protect itself and patients.
Shellshock Bug: 6 Key Facts
News  |  9/27/2014  | 
The Shellshock bug could do more damage than the recent Heartbleed bug. Here's what you need to know.
Internet Of Things Intrigues Intelligence Community
News  |  9/24/2014  | 
IoT presents big opportunity for intelligence agencies, along with information overload and privacy risks.
Backlash Coming On Car-to-Car Talk?
News  |  9/19/2014  | 
Vehicle-to-vehicle communication technology is gaining momentum, and it could become a mandate. But industry and government must address privacy and other concerns.
Federal Inaction Breeds ID Theft, Says Frank Abagnale
News  |  9/18/2014  | 
Onetime "Catch Me If You Can" swindler turned anti-fraud consultant says identity theft is "4,000 times easier" than when he was living a life of crime.
FCC In-Flight Cellphone Ban: Fight's On
News  |  9/17/2014  | 
Lobbyists and legislators urge the FCC not to reverse its 23-year-old ban on using cellphones during airline flight.
Open Source Fix For US Voting System?
Commentary  |  9/16/2014  | 
Open source programmers and maverick election officials want to improve the way we vote, register to vote, and count the votes. Wish them luck.
The Security Skills Shortage No One Talks About
Commentary  |  9/16/2014  | 
Lack of soft skills in information security is an even bigger problem than the shortage of technical expertise.
Dyre Straits: Why This Cloud Attack's Different
Commentary  |  9/12/2014  | 
Dyre is a new breed of Trojan, attacking cloud apps and using the cloud as a delivery vehicle.
Feds Hesitate Moving IT Services To The Cloud
News  |  9/11/2014  | 
Government IT execs compare transitioning data to the cloud to giving their kids the keys to a new convertible.
Apple iCloud Hack's Other Victim: Cloud Trust
Commentary  |  9/10/2014  | 
Our flash poll finds users feel more vulnerable about cloud security in general. No wonder: Apple's opening statement of indignation now sounds a little hollow.
Blinders For Google Glass
News  |  9/9/2014  | 
Cyborg Unplug promises to boot Google Glass and other surveillance devices from local networks.
Cross-Border Digital Searches: An Innovation-Friendly Approach
Commentary  |  9/5/2014  | 
Case between the US government and Microsoft reveals the shortcomings of current laws.
Cyber Security Education: Remove The Limits
Commentary  |  9/4/2014  | 
Highly technical and high-level strategic education must come together to achieve cyber security goals.
Secure The Core: Advice For Agencies Under Attack
Commentary  |  9/3/2014  | 
When facing state-sponsored attacks, perimeter security is never enough.
Wanted By DHS: Breakout Ideas On Domestic Cybersecurity
News  |  9/2/2014  | 
Department of Homeland Security plans to fund cyber defense research efforts to develop pragmatic tools that can be deployed quickly, says Forrester.
NIST Drafts Mobile App Security Guidelines
News  |  8/28/2014  | 
National Institute for Standards and Technology issues first draft of guidelines intended to help federal agencies balance benefits and risks of third-party mobile apps.
US House Inspector General: IT Audit Activist
News  |  8/20/2014  | 
At the 2014 GRC Conference, House IG Theresa Grafenstine argues internal auditors must be more forward looking -- and explains why being exempt from regulations just makes her job harder.
4 Tips: Protect Government Data From Mobile Malware
Commentary  |  8/20/2014  | 
Mobile malware continues to proliferate, particularly on Android devices. These four steps help counter the threat.
Cybersecurity: How Involved Should Boards Of Directors Be?
News  |  8/19/2014  | 
Security audit groups ISACA and IIA weigh in on what role the board of directors should play in an enterprise's cybersecurity strategies.
Microsoft Delays ActiveX Blocking In IE
News  |  8/13/2014  | 
In response to customer concerns, Microsoft won't start blocking ActiveX controls in IE until September.
NASA Mission: Cloud Governance
News  |  8/13/2014  | 
Here's how the space agency's Jet Propulsion Laboratory addressed governance, risk, and compliance for its critical public cloud services.
California Nears Smartphone Kill Switch
News  |  8/12/2014  | 
Law would force phone makers to add remote kill switches; Apple, Google, and Microsoft have already agreed to implement them.
Cyber Risk Dashboards: False Sense Of Control?
Commentary  |  8/12/2014  | 
Federal programs promoting the use of risk dashboards can boost real-time visibility, but only if they are used correctly.
Google To Factor Security In Search Results
News  |  8/7/2014  | 
Websites that don't support HTTPS connections may soon be less prominent in Google search results.
5 Breakthrough DARPA Technologies Beyond GPS
Slideshows  |  8/7/2014  | 
Miniaturization, pulsed lasers, and quantum physics will bring new capabilities for positioning, navigation, and timing (PNT) to the battlefield.
BlackBerry Comeback Far From Certain
News  |  8/5/2014  | 
BlackBerry is finally ready to resume growth, says CEO Chen -- but first the company must overcome its crumbling device business.
Microsoft Privacy Case: What's At Stake?
News  |  8/2/2014  | 
A ruling that Microsoft must turn over emails in a foreign data center could cost US businesses billions and make a mess of international law, experts say.
USB Hardware Easily Subverted, Researchers Claim
News  |  7/31/2014  | 
Security researchers say they can reprogram USB controller chips to hijack USB devices and connected computers.
How To Build A Federal Information Security Team
Commentary  |  7/28/2014  | 
Federal security officers face many challenges building and maintaining an information security team. Here are some tips for putting together a group of employees that will protect your systems and data.
Cyber Attacks Happen: Build Resilient Systems
News  |  7/25/2014  | 
You can't stop all attacks or build the perfect defense system. The higher-level objective is resilience.
Federal IT Networks: Simpler Is Better
News  |  7/23/2014  | 
A survey of government IT executives found that network complexity slows IT performance and hinders deployment of new technologies and services.
Summer Travel Cyber Security Tips For Government Employees
Commentary  |  7/23/2014  | 
Vacationing as a government employee brings special security concerns. Follow these precautions to protect your devices and data on the beach and beyond.
NY Seeks Bitcoin Exchange Regulations
News  |  7/22/2014  | 
Proposal would require state's digital currency dealers to follow strict anti-money-laundering and consumer protection rules.
Web Tracking Advances Beat Privacy Defenses
News  |  7/22/2014  | 
Technologies such as canvas fingerprinting, evercookies, and cookie syncing prompt new call for privacy regulation.
Government IT Priorities: Security Reigns, Cloud Crawls
News  |  7/21/2014  | 
Our new survey shows fed agencies focusing more on security, as they should, but they're still behind the times with cloud use, data center consolidation, and overall innovation.
Feds Pursue Cloud Forensics Standards
News  |  7/17/2014  | 
NIST identifies 65 challenges that forensic investigators face in gathering and analyzing digital information stored in the cloud, seeks help developing standards to aid law enforcement.
Federal Agencies Must Get Practical About Cloud
Commentary  |  7/16/2014  | 
Government agencies are working through the realities of making cloud a routine mode of computing.
Data Breach Notification Law: Will Florida Lead?
Commentary  |  7/16/2014  | 
Florida's stringent new breach notification law might encourage lawmakers to finally enact a federal standard.
Can Privacy Survive Social Networking?
Commentary  |  7/14/2014  | 
Sgrouples shows social networking doesn't have to mean surrendering personal data.
Government Security: Saying 'No' Doesn't Work
Commentary  |  7/14/2014  | 
It's time for government agencies to move beyond draconian security rules and adopt anomaly analytics.
China Labels iPhone A Security Threat
News  |  7/11/2014  | 
State media says the iPhone's ability to collect user location data is dangerous.
HIPAA Compliance: What Every Developer Should Know
Commentary  |  7/11/2014  | 
Apple Health and Google Fit have spurred a surge of interest in health apps. Here's what developers need to understand about HIPAA compliance.
'Windows To Go' Device Wins Federal Cryptographic Certification
News  |  7/10/2014  | 
With FIPS 140-2 Level 3 certification, the Imation IronKey portable USB-based workspace becomes a mobility option for both civilian and military agencies.
Controversial Cyber Security Bill Advances
News  |  7/9/2014  | 
Senate bill aims to promote information sharing to combat cyberthreats, but critics contend it lacks privacy protections.
HIPAA Complaints Vex Healthcare Organizations
News  |  7/8/2014  | 
Since 2013, complaints to the Department of Health and Human Services have risen regarding Health Insurance Portability and Accountability Act violations.
Florida Law Aims To Tighten Data Security
News  |  7/7/2014  | 
Florida's new data privacy law increases security accountability for all enterprises; healthcare providers could face greater burden to protect patients' personal information.
Page 1 / 2   >   >>


IT's Reputation: What the Data Says
IT's Reputation: What the Data Says
InformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business really views IT's performance in delivering services - and, more important, powering innovation. Our results suggest IT leaders should worry less about whether they're getting enough resources and more about the relationships they have with business unit peers.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest September 24, 2014
Start improving branch office support by tapping public and private cloud resources to boost performance, increase worker productivity, and cut costs.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.