IoT
News & Commentary
Latest Content tagged with Cybersecurity
<<   <   Page 2 / 2
Apple's Federighi: Encryption Reversal Would Put US At Risk
Commentary  |  3/7/2016  | 
With the Feds pressing Apple to return to iOS 7-style security, Craig Federighi, Apple's head of software engineering, used an op-ed piece in The Washington Post to explain the need to always race forward.
IoT Security: Industry Finally Waking Up To The Dangers
Commentary  |  3/3/2016  | 
For the last several years, Internet of Things security has been one of the most hotly debated topics at Mobile World Congress. This year, however, IoT security took on a new sense of urgency as more devices are being connected and the technology turns mainstream.
Apple Wins NY iPhone Ruling, Makes Case At Congressional Hearing
News  |  3/2/2016  | 
In the wake of a favorable legal decision in a New York case to access an iPhone in a drug case, Apple argued before a Congressional committee that legislative intervention is needed.
Microsoft's Top Lawyer Voices Support For Encryption At RSA
News  |  3/1/2016  | 
Brad Smith, Microsoft's president and chief legal officer, emphasized the importance of maintaining consumer privacy during his keynote at RSA 2016. He also emphasized his company's support for Apple against the FBI.
HPE Fortifies Security For Mobile And Enterprise
News  |  3/1/2016  | 
HPE Security is looking to improve the security of mobile devices and the enterprise overall with two new security offerings announced in conjunction with the RSA Conference. HPE also released its Cyber Risk Report 2016.
Google Launches Gmail Security Enhancements For Business Users
News  |  3/1/2016  | 
Google's data loss prevention system for Gmail can now recognize text in images to block sensitive information from passing through corporate communication channels.
Apple Should Have Same Confidentiality Rights As Attorneys, Priests
Commentary  |  2/27/2016  | 
Technology companies know more about us than our loved ones, attorneys, or priests. To balance the availability of that information in matters of public safety, businesses should have a limited exemption from being required to provide such information.
Apple Claims FBI iPhone Cracking Demands Are Unconstitutional
News  |  2/26/2016  | 
Apple argues in a court filing that the government is asking for "boundless" power in its bid to get the company to help the FBI unlock an iPhone used by one of the shooters in the San Bernardino terrorist attack.
Apple Preparing Enhanced iPhone Security, NYT Reports
News  |  2/25/2016  | 
The struggle between Apple, the FBI and the US Justice Department speaks to a need for critical discussions about the ramifications and rules in a changing world. The New York Times reports Apple is looking to make it even harder to crack the iPhone's security, while CEO Tim Cook continues to defend his company.
CenturyLink Mounts Multi-Pronged Security As A Service Offering
News  |  2/25/2016  | 
CenturyLink has added server log monitoring and historical analysis of log data for real time protections to its managed security suite.
iPhone Encryption: 5 Ways It's Changed Over Time
Slideshows  |  2/25/2016  | 
Apple's battle with the FBI has put iPhone encryption in the spotlight. However, some might be surprised that the company's encryption efforts have evolved slowly and are not that different from those of other smartphone makers. Here's a look at the 5 phases of the process so far.
BlackBerry Buys Encription Limited For Security Push
News  |  2/24/2016  | 
BlackBerry has acquired cyber-security firm Encription Limited to fortify the offerings in its new Professional Cybersecurity Services division.
Asus Settles FTC Charges, Agrees To 20 Years Of Supervision
News  |  2/24/2016  | 
Asus has settled charges leveled against it by the FTC. The agency accused the router maker of putting the home networks of "hundreds of thousands of consumers" at risk. The company has agreed to 20 years of supervision.
Security Concerns Continue Amid Cloud Adoption
News  |  2/24/2016  | 
While most top IT executives at companies of all sizes continue to express concern about the security of data in the cloud, that hasn't slowed their move to embrace this new infrastructure as a home for corporate data. A new survey and report reveal their top security nightmares and provides some recommendations about how to protect data in the cloud.
Apple: FBI Wants Access To Many Different iPhones
News  |  2/24/2016  | 
Despite the FBI's insistence that it's focused on the San Bernardino terrorism case, authorities want access to more than one iPhone.
Bill Gates Weighs In On Apple Vs. FBI Encryption Battle
News  |  2/23/2016  | 
Microsoft cofounder Bill Gates adds his opinion to the Apple vs. FBI debate. The government has demanded Apple grant access to the locked iPhone of a suspected terrorist.
Tim Cook Vs. FBI: Why Apple Is Fighting The Good Fight
Commentary  |  2/21/2016  | 
A court has told Apple to compromise an iPhone owned by one of the shooters in the December San Bernardino attack that killed 14 people. But Apple should not be required to enlist in the war on bad things.
Apple Vs. FBI: Tech, Politics Weigh In On iPhone Case
News  |  2/18/2016  | 
With a Tweet, the founder of WhiteHat Security may have nudged Google's CEO to take a side, and the rest of the world is beginning to do the same.
Cyber-Security: The Best Plan Of Action To Keep Your Data Safe
News  |  2/18/2016  | 
Like a perverse iteration of Newton's third law, every clever cyber-attack action is always followed by an equally clever reaction from the organization targeted. Is that enough to keep your data safe?
Apple Fights FBI Over Disabling Security In San Bernadino Case
News  |  2/18/2016  | 
The FBI wants Apple to help it crack the passcode of an iPhone owned by one of the shooters in the December San Bernardino attack that killed 14 people. But CEO Tim Cook says this demand would "undermine the very freedoms and liberty our government is meant to protect."
US Defense Department Begins Windows 10 Rollout
News  |  2/17/2016  | 
The US Department of Defense has begun to deploy Windows 10 on 4 million devices and systems. It's a big win for Microsoft's new OS.
Rise And Fall Of The Chief Data Officer
Commentary  |  2/16/2016  | 
The C suite is expanding with more roles dedicated to data and analytics. The Chief Data Officer, or CDO, is one of these roles seen more often in some industries than others. The position may evolve with time. We explain some of the dynamics that cause CDOs to succeed and fail.
8 Ways To Secure Data During US-EU Privacy Fight
Slideshows  |  2/15/2016  | 
After months of legal uncertainty over transatlantic data flows, the European Commission and the US have agreed on a new framework called the EU-US Privacy Shield. But because no text is available yet, there's no way to interpret it. Here's what organizations need to know now.
Where 2016 US Presidential Contenders Stand On Tech Issues
Slideshows  |  2/14/2016  | 
From fighting terror with tech to backing net neutrality to worrying about AI, here's a look at what some of the 2016 US Presidential hopefuls have on their tech agendas.
Google Gives Away 2GB Of Storage To Promote Security
News  |  2/11/2016  | 
Google does its part for Safer Internet Day with its giveaway. Also, Gmail users will start seeing warnings when message senders can't be authenticated and when they don't support transport encryption.
Facebook Faces Trouble In France For Tracking Non-Users
News  |  2/9/2016  | 
The CNIL, France's data regulation authority, has issued a formal notice to Facebook, warning the social network that it needs to fairly collect data concerning the browsing activity of Internet users who do not have an account.
BIOS Hack Detection Added To Dell Enterprise Security Suite
News  |  2/9/2016  | 
With millions of machines potentially vulnerable to attacks on their BIOS firmware, Dell has introduced a verification tool designed for enterprise IT to monitor users' machines and intervene if an attack is detected. The cloud-based tool takes a different approach than other BIOS offerings on the market.
US Education CIO Admits To 'Unacceptable' Behavior
News  |  2/8/2016  | 
US Department of Education CIO Danny Harris was grilled by lawmakers about possible ethics violations. Meanwhile the department, which has a lending budget the size of Citibank, was still said to be vulnerable to security threats.
NASA Denies Hackers Hijacked Its Drone
News  |  2/2/2016  | 
The space agency insists AnonSec didn't commandeer a NASA Global Hawk drone, but it's still looking into claims its network was hacked.
US Air Force Launches First Cyberspace Weapon System
News  |  1/28/2016  | 
The US Air Force hit the "go" button on its first fully operational cyberspace weapon system, which acts as a massive firewall for its Air Force Information Network.
OPM Breach Leads To New Systems, Procedures
Commentary  |  1/28/2016  | 
The Obama Administration announced changes to the Office of Personnel Management designed to ameliorate the flawed systems and processes that led to a massive data breach in late 2014. The plans -- and the steps taken to get there -- hold lessons for any IT organization.
65% Say Cloud As Secure As On-Premises
News  |  1/25/2016  | 
Nearly two-thirds of IT security professionals think cloud software security equals what they can provide in enterprise data centers, according to Cloud Security Alliance survey.
IoT Shows Its Worth To Businesses
News  |  1/23/2016  | 
The Internet of Things (IoT) can be used for a diverse set of tasks, including opening up new business models. A recent Forrester report explores how businesses are embracing IoT.
Encryption Vs. Privacy Battles Rage From Davos To US
News  |  1/22/2016  | 
The debate over efforts to protect users' privacy and encryption versus governments' efforts to fight terrorism was a major focus at the World Economic Forum in Davos this week. Meanwhile, battles over the same issue are emerging in the US from New York to California on the legislative level.
Government IT: Hot Tech Trends In 2016
News  |  1/7/2016  | 
Local, state, and federal governments are aiming to make their tech initiatives more open, responsive, technically up-to-date, and secure this year. Can they pull it off?
Top Data Privacy Issues To Scare You In 2016
Commentary  |  1/6/2016  | 
In 2016 issues regarding privacy, whether in personal or business data, are going to dominate headlines and change the way people interact with technology and the companies that provide it. From encryption to drones, to personal information, here's what to watch in the next 12 months.
Encryption Debate: 8 Things CIOs Should Know
Slideshows  |  1/4/2016  | 
Governments want access to encrypted communications to prevent terrorist attacks, but IT professionals and tech vendors say any weakening of encryption is a threat to privacy and data security.
Anti-ISIS Hacking Group Claims Responsibility For BBC Attack
News  |  1/2/2016  | 
New World Hacking, a US-based organization, is claiming responsibility for the New Year's Eve DDoS attack on the BBC, but claims ISIS was the real target.
Microsoft Now Alerting Users To State-Sponsored Attacks
News  |  12/31/2015  | 
Microsoft is changing its policy after a Reuters report revealed that the company didn't alert users under similar previous circumstances.
Top Priorities For State CIOs: 2016
Slideshows  |  12/31/2015  | 
State government CIOs face many of the same challenges that private sector IT executives do, such as updating systems for a digital world, securing those systems, and leveraging big data. Here are their top 10 priorities, according to NASCIO's annual membership poll.
Yahoo Now Alerting Users Of State-Sponsored Hacks
News  |  12/26/2015  | 
Yahoo will begin warning its users when the company suspects that customers' accounts have been targeted by state-sponsored hackers. Twitter and Facebook have already started similar alert systems.
Apple Blasts UK 'Snooping' Bill
Commentary  |  12/22/2015  | 
In keeping with Tim Cook's professed desire to keep customer information private, Apple objected to a new UK bill that would expand the government's ability to snoop into citizens' messages and Internet use.
Apple's Tim Cook Defends Encryption, Labor Practices In China
News  |  12/21/2015  | 
Charlie Rose sat down with Tim Cook and other major players on the team at Apple for an in-depth look at the inner workings of the company during an interview on CBS's 60 Minutes.
Surveillance Bill Slipped Into Federal Spending Budget
Commentary  |  12/18/2015  | 
The controversial Cybersecurity Information Sharing Act (CISA) has been wrapped in crucial legislation handling much of the federal government's funding.
Spy Agencies Fund IBM's Quantum Computing Research
Commentary  |  12/11/2015  | 
Big Blue gets a multi-year grant from the US intelligence community for the development of quantum computing technology. A universal quantum computer could tackle challenges such as safeguarding against cyberattacks and speeding up medical R&D.
Signal Encrypted Messaging App Comes To Desktops
Commentary  |  12/3/2015  | 
Open Whisper Systems announces an open beta of the desktop version of its encrypted messaging application Signal. The app is endorsed by NSA whistleblower Edward Snowden.
FBI's Spy Tool Details Exposed After Gag Order Is Lifted
Commentary  |  12/2/2015  | 
Following an 11-year battle, Nicholas Merrill finally gets to publicly talk about the FBI's National Security Letter, which demanded he hand over a wide swath of private information about one of his ISP customers.
BlackBerry May Exit Pakistan Over Backdoor Security Demands
Commentary  |  11/30/2015  | 
BlackBerry is threatening to leave Pakistan within the next month if the government keeps insisting on backdoor access to the company's messaging service.
Cyberwar Part 3: Marketing Data Collection Threatens All
Commentary  |  11/27/2015  | 
Marketers are after every scrap of customer data they can get, in hopes of increasing their company's sales. Do you know they may be putting you at risk in the process? In the last of our three-part series on cyberwar, learn what IT needs to know about potential security threats rising from companies' marketing habits.
Cyberwar Part 2: Government Hacks Threaten Private Sector
Commentary  |  11/26/2015  | 
When you hear the term cyberwar, you think about threats to government, but private sector companies are also at risk. In the second of our three-part series on cyberwarfare, we identify three vulnerabilities and offer IT leaders suggestions on what to do about them.
<<   <   Page 2 / 2


Register for InformationWeek Newsletters
White Papers
Current Issue
2016 InformationWeek Elite 100
Our 28th annual ranking of the leading US users of business technology.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of June 19, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.