News & Commentary
Latest Content tagged with Security Monitoring
Page 1 / 2   >   >>
Luring The Elusive Cyber Security Pro
Commentary  |  4/14/2014  | 
Struggling to find scarce IT security talent? Make sure your hiring managers understand the certifications and match candidates for skills fit -- not just credentials.
Heartbleed: Making The Case For SDN
Commentary  |  4/10/2014  | 
Software-defined networking technology could help protect against vulnerabilities like Heartbleed. It's time to develop a more mature SDN option.
VMware Touts Virtualization For Datacenter Security
News  |  4/4/2014  | 
Hypervisor-based security would be like Goldilocks -- "not too hot, not too cold" -- when it comes to halting malware and intruders well inside the enterprise perimeter, say VMware leaders at Interop.
Federal Agencies Fail To Protect Personal Data
News  |  4/3/2014  | 
Government agencies have inconsistently responded to both cyber and non-cyber incidents, a watchdog group says.
New DARPA Office Merges Biology And Technology
News  |  4/2/2014  | 
The Biological Technologies Office will focus on using neuroscience, sensor design, microsystems, and other technologies for defense purposes.
Microsoft Clarifies Email Snooping Policy
News  |  3/31/2014  | 
Microsoft amends its terms of service to stop peeking into customers' emails, even if it suspects they may be stealing from the company.
Office for iPad: Microsoft Shifts Strategy
News  |  3/28/2014  | 
After years of anticipation, Microsoft Office for iPad arrives -- and it's just the beginning of a new push toward apps across all mobile devices, says new CEO Satya Nadella.
LG Smart Lamp: Lighting, Meet Smartphones
News  |  3/24/2014  | 
Control lighting with your smartphone for security and energy-saving purposes.
NSA Records Billions Of Foreign Phone Calls
News  |  3/19/2014  | 
New disclosures from former NSA contractor Edward Snowden detail the National Security Agency's RETRO system.
Target's Weak Points, Examined
News  |  3/18/2014  | 
The Target breach proved once again that in security, technology is the easy part.
Defense Department Adopts NIST Security Standards
News  |  3/14/2014  | 
DOD replaces longstanding information assurance process with NIST's holistic "built-in, not bolt-on," risk-focused security approach.
Windows XP Security Issues: Fact Vs. Fiction
News  |  3/12/2014  | 
Are you prepared for the end of Microsoft support for Windows XP next month?
Big Data Meets Threat Detection
Commentary  |  3/4/2014  | 
Security practitioners are getting a lot smarter about using security analytics and big data to identify threats in real-time. But there's a still a lot to learn.
Feds Look To Big Data On Security Questions
News  |  3/3/2014  | 
Government IT leaders believe continuous monitoring and advanced analytics can help agencies better understand their networks and security.
9 Worst Cloud Security Threats
News  |  3/3/2014  | 
Leading cloud security group lists the "Notorious Nine" top threats to cloud computing in 2013; most are already known but defy 100% solution.
Cloud Security Needs More Layers: HyTrust
News  |  2/27/2014  | 
Eric Chiu, co-founder of HyTrust, says cloud operations will require "layered security" and encrypted virtual machines when at rest.
5 Reasons Security Certifications Matter
Commentary  |  2/26/2014  | 
Thereís a lot of buzz around how certs arenít important. Iím calling BS, and hereís why.
Government Cybersecurity Guidance Wanted By Private Sector
News  |  2/26/2014  | 
Nearly 90% of IT leaders worldwide believe government needs to be involved in helping private sector firms set cyber defense strategies, Dell study finds.
The Rise Of The Security Analyst
News  |  2/25/2014  | 
The most sought-after quality in security hiring today is strategic knowledge versus technical know-how, a global workforce study says.
Cisco-Sourcefire Integration Takes Shape
News  |  2/25/2014  | 
Cisco integrates Sourcefire's advanced malware protection into email and web appliances, and launches new FirePower appliances.
DHS Cancels Plan For License-Plate Tracking System
News  |  2/20/2014  | 
Amid rising privacy concerns, senior Homeland Security leaders say they didn't know about proposal to develop new database system.
Why Businesses Canít Ignore US Cybersecurity Framework
Commentary  |  2/14/2014  | 
Industry leaders and President Obama call the framework just a first step in creating a cybersecurity playbook for 16 US critical infrastructure sectors. But this is more than just a reference manual.
Feds Launch Cyber Security Guidelines For US Infrastructure Providers
News  |  2/12/2014  | 
The White House on Wednesday released the first version of its cyber security framework for protecting critical infrastructure. Critics say these voluntary guidelines enshrine the status quo.
Labs Must Protect Newly Portable Patient Data
News  |  2/12/2014  | 
Now that the Department of Health and Human Services has ruled that consumers can get their medical test results, labs' IT departments must give security and privacy top priority.
Target Breach Takeaway: Secure Your Remote Access
Commentary  |  2/10/2014  | 
Yes, attackers could use stolen credentials to get into your systems from a distance. But slamming the door is not the answer.
Defense Dept. Calls For Expanded Nuclear Monitoring
News  |  1/22/2014  | 
US must ramp up surveillance and big data analytics tools to meet challenge of global nuclear proliferation monitoring, warns DOD Defense Science Board report.
A Tale Of Two Cyberheists
Commentary  |  1/22/2014  | 
Both Target and SnapChat recently fell victim to high-profile security breaches, but the long-term damage to SnapChat will be much greater. Here's why.
Obama Outlines 5 Surveillance Reforms
News  |  1/17/2014  | 
NSA's controversial bulk collection of phone records will end, but businesses may be asked to retain data in case the government needs it.
3 Reasons Security Pros Are In The Driverís Seat Now
Commentary  |  1/17/2014  | 
The coming weeks are the perfect time to ask for a raise or find the job of your dreams. Don't let a perfect storm of security problems go to waste.
IT Security Teams Adapt To Big Data
News  |  1/15/2014  | 
Big data means big changes in the makeup of IT security teams.
Feds Must Prioritize EHR Billing Fraud, Watchdogs Say
News  |  1/13/2014  | 
Medicare agency should provide better guidance to contractors on how to spot billing fraud, Inspector General says.
LinkedIn Sues After Scraping Of User Data
News  |  1/8/2014  | 
LinkedIn wants Amazon to turn over names of people it says registered fake LinkedIn accounts to extract users' data.
Is Your Security Program Effective? 7 Must-Ask Questions
Commentary  |  1/8/2014  | 
Business leaders can, and should, insist on metrics to prove protection efforts are worth the money.
NSA Elite Hackers Infiltrated Network Equipment
News  |  1/2/2014  | 
A treasure trove of tools used by NSA hackers for planting backdoors via Cisco, Juniper, and Apple products was unveiled in the latest document leaks from the agency.
Software-Defined Networking Rises Above The Hype
Commentary  |  12/30/2013  | 
SDN earned plenty of hype in 2013, but the ability to program networks improves network performance and security in a more systematic and automatic fashion.
Top 15 Government Technology Stories of 2013
News  |  12/26/2013  | 
From robots to Obamacare, here are the 15 most popular InformationWeek government tech stories from 2013.
Healthcare Data Breaches To Surge In 2014
News  |  12/26/2013  | 
The healthcare industry will see even bigger breaches of data and patient privacy in 2014, an Experian report says.
Using NetFlow Data For Robust Network Security
News  |  12/24/2013  | 
NetFlow analytic data can spot dangerous traffic patterns including anomalous "hot-spots" of activity and compromised hosts.
FBI Traces Harvard Bomb Hoax To Undergrad
News  |  12/20/2013  | 
The FBI says a Harvard undergrad's decision to access Tor over the university's wireless network helped unmask an alleged sender of bomb threats.
Reform NSA, Tech Execs Tell Obama
News  |  12/18/2013  | 
Top leaders from Apple, AT&T, Facebook, Google, Microsoft, Yahoo meet with President Obama, urge him to "move aggressively" on US surveillance reforms.
What All That NSA Intelligence Costs
News  |  12/17/2013  | 
Intelligence agencies spend three times more of their budgets on IT than average government agencies, says IDC report.
2014 Will Put The Software In SDN
Commentary  |  12/16/2013  | 
Next year, the "S" in SDN will take precedence, allowing new applications and security benefits, according to OpenFlow champion Dan Pitt.
Energy Department Breach Years In Making, Investigators Say
News  |  12/13/2013  | 
July data breach that affected up to 150,000 employees traces back to a string of managerial and technical failures, investigators conclude.
DDoS Attacks Wreak Havoc On Data Centers
News  |  12/12/2013  | 
Distributed-denial-of-service attacks are a growing cause of costly data center outages, according to a new study.
Cybercriminals Enlist Database Cloud Services
News  |  12/12/2013  | 
Database-as-a-service supports a new Trojan-based attack that steals businesses' online banking credentials.
NIST Cybersecurity Framework: Donít Underestimate It
Commentary  |  12/9/2013  | 
A cybersecurity framework for critical infrastructure owners is voluntary but will become the de facto standard for litigators and regulators. Here's how to prepare.
DARPA Cyber Defense Challenge: $2 Million Prize
News  |  12/9/2013  | 
Defense research agency's Cyber Grand Challenge aims to close the gap between vulnerability discovery and remediation.
Electronic Privacy Laws Need An Overhaul
Commentary  |  12/5/2013  | 
Laws governing electronic privacy, written before companies like Google and Facebook existed, are in desperate need of Congressional revision.
Microsoft Launches Cybercrime Center
News  |  12/4/2013  | 
Microsoft expands global role supporting law enforcement, government, and businesses fighting cybercrime.
US Moving From Technology Leader To Laggard
Commentary  |  12/2/2013  | 
R&D, science, and technology investments aren't keeping pace with other nations -- and face growing risks from cybertheft, according to government reports.
Page 1 / 2   >   >>


The Agile Archive
The Agile Archive
When it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 - 2014
Our InformationWeek Elite 100 issue -- our 26th ranking of technology innovators -- shines a spotlight on businesses that are succeeding because of their digital strategies. We take a close at look at the top five companies in this year's ranking and the eight winners of our Business Innovation awards, and offer 20 great ideas that you can use in your company. We also provide a ranked list of our Elite 100 innovators.
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.