News & Commentary
Latest Content tagged with Cybersecurity
<<   <   Page 2 / 2
Cyber Risk Dashboards: False Sense Of Control?
Commentary  |  8/12/2014  | 
Federal programs promoting the use of risk dashboards can boost real-time visibility, but only if they are used correctly.
Google To Factor Security In Search Results
News  |  8/7/2014  | 
Websites that don't support HTTPS connections may soon be less prominent in Google search results.
5 Breakthrough DARPA Technologies Beyond GPS
Slideshows  |  8/7/2014  | 
Miniaturization, pulsed lasers, and quantum physics will bring new capabilities for positioning, navigation, and timing (PNT) to the battlefield.
BlackBerry Comeback Far From Certain
News  |  8/5/2014  | 
BlackBerry is finally ready to resume growth, says CEO Chen -- but first the company must overcome its crumbling device business.
Microsoft Privacy Case: What's At Stake?
News  |  8/2/2014  | 
A ruling that Microsoft must turn over emails in a foreign data center could cost US businesses billions and make a mess of international law, experts say.
USB Hardware Easily Subverted, Researchers Claim
News  |  7/31/2014  | 
Security researchers say they can reprogram USB controller chips to hijack USB devices and connected computers.
How To Build A Federal Information Security Team
Commentary  |  7/28/2014  | 
Federal security officers face many challenges building and maintaining an information security team. Here are some tips for putting together a group of employees that will protect your systems and data.
Cyber Attacks Happen: Build Resilient Systems
News  |  7/25/2014  | 
You can't stop all attacks or build the perfect defense system. The higher-level objective is resilience.
Federal IT Networks: Simpler Is Better
News  |  7/23/2014  | 
A survey of government IT executives found that network complexity slows IT performance and hinders deployment of new technologies and services.
Summer Travel Cyber Security Tips For Government Employees
Commentary  |  7/23/2014  | 
Vacationing as a government employee brings special security concerns. Follow these precautions to protect your devices and data on the beach and beyond.
NY Seeks Bitcoin Exchange Regulations
News  |  7/22/2014  | 
Proposal would require state's digital currency dealers to follow strict anti-money-laundering and consumer protection rules.
Web Tracking Advances Beat Privacy Defenses
News  |  7/22/2014  | 
Technologies such as canvas fingerprinting, evercookies, and cookie syncing prompt new call for privacy regulation.
Government IT Priorities: Security Reigns, Cloud Crawls
News  |  7/21/2014  | 
Our new survey shows fed agencies focusing more on security, as they should, but they're still behind the times with cloud use, data center consolidation, and overall innovation.
Feds Pursue Cloud Forensics Standards
News  |  7/17/2014  | 
NIST identifies 65 challenges that forensic investigators face in gathering and analyzing digital information stored in the cloud, seeks help developing standards to aid law enforcement.
Federal Agencies Must Get Practical About Cloud
Commentary  |  7/16/2014  | 
Government agencies are working through the realities of making cloud a routine mode of computing.
Data Breach Notification Law: Will Florida Lead?
Commentary  |  7/16/2014  | 
Florida's stringent new breach notification law might encourage lawmakers to finally enact a federal standard.
Can Privacy Survive Social Networking?
Commentary  |  7/14/2014  | 
Sgrouples shows social networking doesn't have to mean surrendering personal data.
Government Security: Saying 'No' Doesn't Work
Commentary  |  7/14/2014  | 
It's time for government agencies to move beyond draconian security rules and adopt anomaly analytics.
China Labels iPhone A Security Threat
News  |  7/11/2014  | 
State media says the iPhone's ability to collect user location data is dangerous.
HIPAA Compliance: What Every Developer Should Know
Commentary  |  7/11/2014  | 
Apple Health and Google Fit have spurred a surge of interest in health apps. Here's what developers need to understand about HIPAA compliance.
'Windows To Go' Device Wins Federal Cryptographic Certification
News  |  7/10/2014  | 
With FIPS 140-2 Level 3 certification, the Imation IronKey portable USB-based workspace becomes a mobility option for both civilian and military agencies.
Controversial Cyber Security Bill Advances
News  |  7/9/2014  | 
Senate bill aims to promote information sharing to combat cyberthreats, but critics contend it lacks privacy protections.
HIPAA Complaints Vex Healthcare Organizations
News  |  7/8/2014  | 
Since 2013, complaints to the Department of Health and Human Services have risen regarding Health Insurance Portability and Accountability Act violations.
Florida Law Aims To Tighten Data Security
News  |  7/7/2014  | 
Florida's new data privacy law increases security accountability for all enterprises; healthcare providers could face greater burden to protect patients' personal information.
Facebook Mood Experiment Draws FTC Complaint
News  |  7/7/2014  | 
Electronic Privacy Information Center files a complaint against Facebook alleging that its news feed experiment deceived users and violated a 2012 Consent Order.
TSA Requires Charged Devices At Some Overseas Airports
News  |  7/7/2014  | 
Homeland Security tells US-bound air travelers at certain overseas airports that mobile devices need to be operational when boarding, or gadgets will be confiscated.
Google Users Change Search Habits After Snowden
News  |  7/3/2014  | 
Researchers find significant decrease in "embarrassing" and "private" terms in Google searches after NSA surveillance revelations.
Virtual Currencies Draw Fresh Regulator Scrutiny
News  |  7/2/2014  | 
Federal regulators are paying more attention to the growing use of bitcoin and other virtual online currencies. The GAO calls for more consumer protections.
BlackBerry Swipes At Android Security
News  |  6/28/2014  | 
In response to Google I/O announcements, BlackBerry criticizes Android's lack of security. On point, or sour grapes?
Montana Health Department Hacked
News  |  6/25/2014  | 
State of Montana notifies 1.3 million patients of breach to Department of Public Health and Human Services server.
Sensitive Data Protection Bedevils IT Security Pros
News  |  6/24/2014  | 
Most organizations don't know where their sensitive structured or unstructured data resides, says new Ponemon study.
Phishing Scam Targeted 75 US Airports
News  |  6/23/2014  | 
Major cyberattack carried out in 2013 by an undisclosed nation-state sought to breach US commercial aviation networks, says Center for Internet Security report.
SMBs Ignoring Insider Threats
News  |  6/23/2014  | 
Many smaller organizations do not adequately protect against insider threats, CERT expert warns.
White House Maker Faire: 10 Cool Inventions
Slideshows  |  6/21/2014  | 
More than 100 exhibitors of all ages gathered at the White House to show off their inventions. Check out some of the intriguing innovations.
Cyber Attackers Target Small, Midsized Businesses
News  |  6/18/2014  | 
As large companies beef up security, attackers seek out weak links and use social tactics to hit smaller enterprises.
NIST Security Guidance Revision: Prepare Now
Commentary  |  6/16/2014  | 
NIST 800-53 Revision 5 will likely put more emphasis on continuous monitoring. Don't wait until it arrives to close your security gaps.
FCC Wants More Cybersecurity Collaboration, Less Regulation
News  |  6/13/2014  | 
In a speech to the American Enterprise Institute, FCC Chairman Tom Wheeler outlined principles for a market based approach.
Academia: Government's Biggest Cyber Security Ally?
Commentary  |  6/12/2014  | 
Federal cyber security programs need access to fresh talent. They can boost the quality of that talent by bolstering cyber security training in colleges and universities.
IBM Launches SoftLayer Data Centers
News  |  6/11/2014  | 
Two new data centers allow federal agencies to create cloud services quickly and securely on both virtual and bare metal servers. FedRAMP and FISMA certifications are in the works.
UN Unveils Big Data Climate Change Challenge
News  |  6/10/2014  | 
United Nations hopes its big data climate contest will reveal new ways big data can alleviate problems caused by climate change.
13 Ways To Beat Big Brother
Slideshows  |  6/9/2014  | 
Just because cameras are everywhere doesn't mean you have to be under surveillance all the time.
Government Advances Continuous Security Monitoring
News  |  6/6/2014  | 
DOD, DHS expect smart technologies will defend networks against common attacks, free IT personnel to deal with more dangerous threats.
Federal CIOs Feel Hobbled By Congress
News  |  6/6/2014  | 
Government IT leaders struggle to incorporate cloud and mobility, bolster security amidst outdated government policies and budget constraints, says study.
DOD Cyber Architecture Takes Shape
News  |  6/5/2014  | 
Military's cyber defense efforts remain a work in progress, officials say.
GAO Faults Agencies On Cyber Incident Response
News  |  6/4/2014  | 
Recent GAO report finds that agencies lack consistent documented responses to cybersecurity incidents, recommends greater scrutiny of response plans.
What DOD's Joint Information Environment Needs To Succeed
Commentary  |  6/3/2014  | 
The Defense Department's massive bet on an enterprise-wide information environment depends on whether DOD and industry can align their investment roadmaps. Here's how else industry can help.
Government Cloud Use Hits Inflection Point
News  |  5/30/2014  | 
New standards, security, and architectures mean the CloudFirst stars are finally coming into alignment.
UAE National ID Program: Model Worth Watching
Commentary  |  5/29/2014  | 
United Arab Emirates officials are laying the foundation for a national identity verification system that could change how people are ID'd for everything from passports to employment documents.
Government Hiring Practices Hamper Cybersecurity Efforts
News  |  5/20/2014  | 
Federal agencies find it difficult to hire unconventional but well-qualified talent to battle cyberattacks, experts say.
Cisco CEO: U.S. Should Reform Surveillance Rules
News  |  5/15/2014  | 
Cisco CEO John Chambers says his company does not enable NSA spying, and that the U.S. government must establish proper policies.
<<   <   Page 2 / 2


Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest, Nov. 10, 2014
Just 30% of respondents to our new survey say their companies are very or extremely effective at identifying critical data and analyzing it to make decisions, down from 42% in 2013. What gives?
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 16, 2014.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.