News & Commentary
Latest Content tagged with Identity & Access Management
Secure Collaboration Tool Aims to Stop Data Leaks
News  |  4/18/2014  | 
BAE Systems' leakage-prevention Secure Information Broker Appliance program edits info your organization doesn't want outsiders to see.
VMware Touts Virtualization For Datacenter Security
News  |  4/4/2014  | 
Hypervisor-based security would be like Goldilocks -- "not too hot, not too cold" -- when it comes to halting malware and intruders well inside the enterprise perimeter, say VMware leaders at Interop.
Cloak App Helps You Avoid Social Contacts
News  |  3/24/2014  | 
Meet Cloak, the antisocial media app that uses your friends' Instagram and Foursquare location feeds so you can avoid running into them.
NSA Denies Impersonating Facebook To Serve Malware
News  |  3/14/2014  | 
Facebook's Zuckerberg speaks out after Snowden leak suggests NSA server posed as social media site to infect millions of computers with surveillance malware.
Feds Move Toward Hardwired Credentials On Mobile Devices
News  |  3/7/2014  | 
NIST proposes ways for mobile-device users to access government networks without requiring smart-card readers.
Cloud Security Needs More Layers: HyTrust
News  |  2/27/2014  | 
Eric Chiu, co-founder of HyTrust, says cloud operations will require "layered security" and encrypted virtual machines when at rest.
5 Reasons Security Certifications Matter
Commentary  |  2/26/2014  | 
Thereís a lot of buzz around how certs arenít important. Iím calling BS, and hereís why.
Target Breach Takeaway: Secure Your Remote Access
Commentary  |  2/10/2014  | 
Yes, attackers could use stolen credentials to get into your systems from a distance. But slamming the door is not the answer.
Facebook's Next Decade: 3 Key Challenges
Commentary  |  2/7/2014  | 
Facebook redefined privacy and sharing, but the next 10 years will force the social network to find new ways to connect with a changed culture.
Federal CIOs' Current Security Dilemma
Commentary  |  2/6/2014  | 
Three initiatives meant to improve government IT security are languishing from funding challenges, yet CIOs are asked to deliver on the promise of shared services.
6 Ways SDN Shakes Up The Enterprise
Slideshows  |  1/29/2014  | 
Software-defined networking promises improvements to enterprise IT that run the gamut from more responsive applications to heightened security and enhanced data analytics.
3 Reasons Security Pros Are In The Driverís Seat Now
Commentary  |  1/17/2014  | 
The coming weeks are the perfect time to ask for a raise or find the job of your dreams. Don't let a perfect storm of security problems go to waste.
My Dearest Spammer
Commentary  |  1/14/2014  | 
A love letter to the tech marketers who buy my contact information.
U.S. Citizens More Worried About ID Theft Than Privacy
News  |  12/27/2013  | 
Despite NSA scare, U.S. voters are five times more concerned about hacking than tracking, CCIA study says.
Patient Data On Filesharing Service Provokes Legal Trouble
News  |  12/23/2013  | 
Medical file reportedly found on a peer-to-peer filesharing network leads to an FTC complaint, a federal lawsuit, and a book claiming regulatory overreach.
FBI Traces Harvard Bomb Hoax To Undergrad
News  |  12/20/2013  | 
The FBI says a Harvard undergrad's decision to access Tor over the university's wireless network helped unmask an alleged sender of bomb threats.
Reform NSA, Tech Execs Tell Obama
News  |  12/18/2013  | 
Top leaders from Apple, AT&T, Facebook, Google, Microsoft, Yahoo meet with President Obama, urge him to "move aggressively" on US surveillance reforms.
What All That NSA Intelligence Costs
News  |  12/17/2013  | 
Intelligence agencies spend three times more of their budgets on IT than average government agencies, says IDC report.
Former Homeland Security CIO Tapped As Startup CEO
News  |  12/13/2013  | 
Richard Spires, former IRS and DHS IT chief, takes the helm as CEO of Resilient Network Systems.
Energy Department Breach Years In Making, Investigators Say
News  |  12/13/2013  | 
July data breach that affected up to 150,000 employees traces back to a string of managerial and technical failures, investigators conclude.
NSA Tracks Targets With Google Cookies
News  |  12/11/2013  | 
Leaked NSA documents indicate it uses Google's advertising cookies to track targets for offensive hacking.
Attention Apple Shoppers: iBeacon Is Watching
News  |  12/6/2013  | 
Bluetooth transmitters will monitor shoppers' in-store movement and make recommendations based on location.
Electronic Privacy Laws Need An Overhaul
Commentary  |  12/5/2013  | 
Laws governing electronic privacy, written before companies like Google and Facebook existed, are in desperate need of Congressional revision.
Happy Hour 'Virus' Promises Respite From Work
News  |  12/2/2013  | 
Need a little extra time off? Ad campaign offers fake virus attack on your computer's screen.
NSA Surveillance Infected 50,000 PCs With Malware
News  |  11/25/2013  | 
Leaked document details agency's "implants," satellite intercepts, joint CIA eavesdropping operations, and embassy-based monitoring programs abroad.
10 Most Misunderstood Facebook Privacy Facts
News  |  11/21/2013  | 
Facebook privacy changes seem to never end. Get a grip on your account with these privacy settings tips and tricks.
Beware The Looming Digital Identity Crisis
Commentary  |  11/20/2013  | 
Social networks have spawned a consumer identity at odds with the corporate world's idea of secure identity management. How will your customer expectations and business needs mesh?
Cyber Insecurity: When Contractors Are Weak Link
Commentary  |  11/20/2013  | 
Government and defense contractors play a crucial role in protecting sensitive information. But the evidence suggests they are losing the battle.
Amazon's CIA Win Hurt More Than IBM's Pride
Commentary  |  11/19/2013  | 
By winning a $600 million CIA contract, Amazon Web Services has positioned itself as equal to IBM in building secure systems and superior in large-scale, elastic systems.
Welcome To The New InformationWeek
Commentary  |  11/15/2013  | 
We're leaving behind the old, one-way publishing model of business technology journalism and pioneering an approach that emphasizes community and true multiway discourse.
Mobile Transforms IT's Role: What's Next?
Commentary  |  11/15/2013  | 
Mobile devices have reshaped the employee-IT relationship and how we work with tools like Google Docs. Brace yourself for big changes over the next five years.
DARPA Dangles $2 Million For Security Automation Idea
News  |  10/25/2013  | 
Agency's latest challenge will award $2 million to team that builds an unmanned, self-patching network defense system capable of responding to cyber-attacks.
NIST Security Standards: Fallacies And Pitfalls
Commentary  |  10/14/2013  | 
National Institute of Standards and Technology's latest revision to its Network Security Standard is an improvement, but gives compliant agencies a false sense of security.
Reaping The Security Rewards Of SDN
News  |  9/30/2013  | 
Software-defined network is a major trend -- here's why some experts believe security pros should be paying attention
Cisco Launches Security Services Division
News  |  9/10/2013  | 
New consulting, product implementation and support, and managed services division reflects industry push to provide broader information security services to customers.
Next-Gen Firewalls Change The Rules Of Firewall Management
News  |  8/30/2013  | 
Layers of complexity in network firewalls create the need for a systematic change management approach.
What Cisco Gains From Sourcefire
News  |  7/23/2013  | 
$2.7 billion acquisition deal brings intrusion expertise; Sourcefire promises Snort intrusion detection and prevention system will remain free and open source.
Barracuda Security Equipment Contains Hardcoded Backdoors
News  |  1/24/2013  | 
Multiple appliances sold by Barracuda contain undocumented usernames and passwords, as well as SSH access functionality, which an attacker could use to gain shell-level access to devices.


The Agile Archive
The Agile Archive
When it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 - 2014
Our InformationWeek Elite 100 issue -- our 26th ranking of technology innovators -- shines a spotlight on businesses that are succeeding because of their digital strategies. We take a close at look at the top five companies in this year's ranking and the eight winners of our Business Innovation awards, and offer 20 great ideas that you can use in your company. We also provide a ranked list of our Elite 100 innovators.
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.