News & Commentary
Latest Content tagged with Endpoint Security
Paul Allen Invests In Online Voting Firm
News  |  4/9/2014  | 
E-voting firm Scytl receives $40 million from Paul Allen's Vulcan Capital to continue election modernization efforts. Defense Department among its customers.
Unisys Stealth Makes Sensitive Data Go Dark
News  |  4/8/2014  | 
Can you make data invisible to intruders? Unisys Stealth system creates a community around sensitive data and encrypts communications between all users.
Windows XP Plug Pulled: 5 Questions
News  |  4/8/2014  | 
After 12 years, Windows XP officially becomes an unsupported OS. Here's what you need to know, from old PCs to dicey ATMs.
VMware Touts Virtualization For Datacenter Security
News  |  4/4/2014  | 
Hypervisor-based security would be like Goldilocks -- "not too hot, not too cold" -- when it comes to halting malware and intruders well inside the enterprise perimeter, say VMware leaders at Interop.
New DARPA Office Merges Biology And Technology
News  |  4/2/2014  | 
The Biological Technologies Office will focus on using neuroscience, sensor design, microsystems, and other technologies for defense purposes.
Microsoft Office For iPad: 8 Facts
News  |  3/18/2014  | 
After years of rumors, Office for iPad could arrive before the end of the month. Here's what we know.
Windows XP Holdouts: 6 Top Excuses
News  |  3/17/2014  | 
Microsoft cuts support for Windows XP in less than a month, but millions still use the OS. Are these rationales worth the risk?
Windows XP Goes Dark: 5 Things To Expect
News  |  3/13/2014  | 
Microsoft customers face Windows XP's end-of-service deadline. How much will you suffer from the lack of support?
Windows XP Security Issues: Fact Vs. Fiction
News  |  3/12/2014  | 
Are you prepared for the end of Microsoft support for Windows XP next month?
Office 365 Gets Personal
News  |  3/3/2014  | 
Microsoft Office 365 will soon become more collaborative, focusing on relevant content to provide a more personalized work experience.
NSA Too Focused On Perimeter Defense, Clarke Says
News  |  2/26/2014  | 
The Former White House cybersecurity adviser says the NSA's focus on perimeter security made it vulnerable to insider Edward Snowden.
5 Reasons Security Certifications Matter
Commentary  |  2/26/2014  | 
Thereís a lot of buzz around how certs arenít important. Iím calling BS, and hereís why.
IBM Develops Self-Destructing Chips For DARPA
News  |  2/18/2014  | 
DARPA seeks technology that would trigger electronics on the battlefield to self-destruct. The goal: Electronics that last only as long as needed.
NAC Comes Back
News  |  2/5/2014  | 
BYOD and advanced malware threats help network access control morph from tired technology to mainstream must-have.
Big Cloud Power, Small Package
Big Cloud Power, Small Package
InformationWeek Videos  |  2/5/2014  | 
IT architect Bill Kleyman demonstrates the test environment he built using Citrix Receiver and Dell Wyse Cloud Connect.
6 Ways SDN Shakes Up The Enterprise
Slideshows  |  1/29/2014  | 
Software-defined networking promises improvements to enterprise IT that run the gamut from more responsive applications to heightened security and enhanced data analytics.
How To Get Ready For The Internet Of Things
Commentary  |  1/23/2014  | 
IoT technologies solve business problems and generate new revenue, but implementing them is a complex task. Here are three ways to approach IoT.
Homeland Security Makes Cybersecurity A Managed Service
News  |  1/23/2014  | 
Einstein 3 intrusion prevention system analyzes traffic to and from executive-branch agencies to block threats at the ISP level.
Beware Of The Internet Of Things' Despicable Side
Commentary  |  1/22/2014  | 
Securing a network of connected devices and intelligent systems carries a hefty new price for IT professionals: personal safety.
3 Reasons Security Pros Are In The Driverís Seat Now
Commentary  |  1/17/2014  | 
The coming weeks are the perfect time to ask for a raise or find the job of your dreams. Don't let a perfect storm of security problems go to waste.
Windows 9: What We Know
News  |  1/15/2014  | 
With Windows 8.1 floundering, Windows 9 rumors have picked up steam. What can you expect from the next version of Windows?
7 InfoSec Predictions For 2014: Good, Bad & Ugly
Commentary  |  1/3/2014  | 
First, the bad news: Windows XP doomsday, escalating ransomware, botnet-driven attacks, emerging SDN threats. The good news: Threat intelligence goes mainstream.
Internet Of Things May Strangle Enterprise Bandwidth
Commentary  |  12/26/2013  | 
The Internet of Things is poised to bring a flood of WAN traffic and new Internet-enabled devices to enterprise WANs. Be sure your corporate network is ready for it.
Healthcare Data Breaches To Surge In 2014
News  |  12/26/2013  | 
The healthcare industry will see even bigger breaches of data and patient privacy in 2014, an Experian report says.
No Holiday Respite For IT Pros
News  |  12/24/2013  | 
A survey of IT professionals shows that many will be on call this holiday season dealing with users' remote network access problems and other IT glitches.
Former Homeland Security CIO Tapped As Startup CEO
News  |  12/13/2013  | 
Richard Spires, former IRS and DHS IT chief, takes the helm as CEO of Resilient Network Systems.
NIST Cybersecurity Framework: Donít Underestimate It
Commentary  |  12/9/2013  | 
A cybersecurity framework for critical infrastructure owners is voluntary but will become the de facto standard for litigators and regulators. Here's how to prepare.
Electronic Privacy Laws Need An Overhaul
Commentary  |  12/5/2013  | 
Laws governing electronic privacy, written before companies like Google and Facebook existed, are in desperate need of Congressional revision.
Microsoft Launches Cybercrime Center
News  |  12/4/2013  | 
Microsoft expands global role supporting law enforcement, government, and businesses fighting cybercrime.
US Moving From Technology Leader To Laggard
Commentary  |  12/2/2013  | 
R&D, science, and technology investments aren't keeping pace with other nations -- and face growing risks from cybertheft, according to government reports.
Keep Data Off Mobile Devices & Away From Adversaries
Commentary  |  11/27/2013  | 
Why we must focus on protecting the data rather than securing mobile devices.
NSA Surveillance Infected 50,000 PCs With Malware
News  |  11/25/2013  | 
Leaked document details agency's "implants," satellite intercepts, joint CIA eavesdropping operations, and embassy-based monitoring programs abroad.
Cyber Insecurity: When Contractors Are Weak Link
Commentary  |  11/20/2013  | 
Government and defense contractors play a crucial role in protecting sensitive information. But the evidence suggests they are losing the battle.
Welcome To The New InformationWeek
Commentary  |  11/15/2013  | 
We're leaving behind the old, one-way publishing model of business technology journalism and pioneering an approach that emphasizes community and true multiway discourse.
iPad + Desktop: Powerhouse Combo For 2014
Commentary  |  11/15/2013  | 
Businesses should buy more desktops and tablets, not laptops, in the upcoming PC refresh. How does Windows apps compatibility fit in?
Is Perimeter Security Really Dead?
News  |  11/15/2013  | 
Despite naysayers, many security experts believe perimeter defenses have relevance when deployed as a part of defense-in-depth.
Internet Of Things Opens Doors to Attack
Commentary  |  11/15/2013  | 
The Internet of Things may be overhyped, but the increased access to corporate and SCADA networks it offers to outside attackers is cause for concern.
DARPA Dangles $2 Million For Security Automation Idea
News  |  10/25/2013  | 
Agency's latest challenge will award $2 million to team that builds an unmanned, self-patching network defense system capable of responding to cyber-attacks.
NIST Security Standards: Fallacies And Pitfalls
Commentary  |  10/14/2013  | 
National Institute of Standards and Technology's latest revision to its Network Security Standard is an improvement, but gives compliant agencies a false sense of security.
Cisco Launches Security Services Division
News  |  9/10/2013  | 
New consulting, product implementation and support, and managed services division reflects industry push to provide broader information security services to customers.
What Cisco Gains From Sourcefire
News  |  7/23/2013  | 
$2.7 billion acquisition deal brings intrusion expertise; Sourcefire promises Snort intrusion detection and prevention system will remain free and open source.
Google Shares Advice On Wi-Fi Security
News  |  6/27/2013  | 
Many Wi-Fi networks aren't secure, as Google's collection of data through its Street View cars demonstrated.
Barracuda Security Equipment Contains Hardcoded Backdoors
News  |  1/24/2013  | 
Multiple appliances sold by Barracuda contain undocumented usernames and passwords, as well as SSH access functionality, which an attacker could use to gain shell-level access to devices.


The Agile Archive
The Agile Archive
When it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.