News & Commentary
Latest Content tagged with Vulnerabilities & Threats
Page 1 / 2   >   >>
Twitter Posts Betray Illness
News  |  4/14/2014  | 
Tweets reveal whether you have influenza, according to Penn State researchers.
Heartbleed: Making The Case For SDN
Commentary  |  4/10/2014  | 
Software-defined networking technology could help protect against vulnerabilities like Heartbleed. It's time to develop a more mature SDN option.
Windows XP Plug Pulled: 5 Questions
News  |  4/8/2014  | 
After 12 years, Windows XP officially becomes an unsupported OS. Here's what you need to know, from old PCs to dicey ATMs.
FTC Privacy Enforcement Power Wins Court Blessing
News  |  4/8/2014  | 
The agency's claim against Wyndham Hotels for poor data security practices has been allowed to proceed.
VMware Touts Virtualization For Datacenter Security
News  |  4/4/2014  | 
Hypervisor-based security would be like Goldilocks -- "not too hot, not too cold" -- when it comes to halting malware and intruders well inside the enterprise perimeter, say VMware leaders at Interop.
Federal Agencies Fail To Protect Personal Data
News  |  4/3/2014  | 
Government agencies have inconsistently responded to both cyber and non-cyber incidents, a watchdog group says.
New DARPA Office Merges Biology And Technology
News  |  4/2/2014  | 
The Biological Technologies Office will focus on using neuroscience, sensor design, microsystems, and other technologies for defense purposes.
Feds To Improve Threat Information Sharing
News  |  3/31/2014  | 
Project Interoperability aims to develop and standardize formats for sharing security and threat information among organizations.
Microsoft Clarifies Email Snooping Policy
News  |  3/31/2014  | 
Microsoft amends its terms of service to stop peeking into customers' emails, even if it suspects they may be stealing from the company.
Interop 2014: 8 Hot Technologies
Slideshows  |  3/29/2014  | 
Interop 2014 kicks off Monday in Las Vegas. Here's a sneak peek of technologies to watch.
Office for iPad: Microsoft Shifts Strategy
News  |  3/28/2014  | 
After years of anticipation, Microsoft Office for iPad arrives -- and it's just the beginning of a new push toward apps across all mobile devices, says new CEO Satya Nadella.
Cybercrime Black Markets Grow Up
News  |  3/26/2014  | 
Cybercrime forums selling advanced attacks on demand are outpacing businesses' ability to defend themselves, new study from RAND finds.
Cloak App Helps You Avoid Social Contacts
News  |  3/24/2014  | 
Meet Cloak, the antisocial media app that uses your friends' Instagram and Foursquare location feeds so you can avoid running into them.
Windows XP: Feds Brace For End Of Support
News  |  3/24/2014  | 
Roughly one in ten US government PCs still use Windows XP. They will be more vulnerable to attacks when XP support ends on April 8.
NSA Records Billions Of Foreign Phone Calls
News  |  3/19/2014  | 
New disclosures from former NSA contractor Edward Snowden detail the National Security Agency's RETRO system.
Target's Weak Points, Examined
News  |  3/18/2014  | 
The Target breach proved once again that in security, technology is the easy part.
Internet Of Things Meets Cars: Security Threats Ahead
News  |  3/18/2014  | 
As the Internet of Things extends to automobiles, security and privacy threats come along for the ride.
Windows XP Holdouts: 6 Top Excuses
News  |  3/17/2014  | 
Microsoft cuts support for Windows XP in less than a month, but millions still use the OS. Are these rationales worth the risk?
Lockheed Martin Acquires Cybersecurity Firm Industrial Defender
News  |  3/14/2014  | 
Acquisition of critical infrastructure cyber-security firm gives Lockheed Martin access to commercial markets while offering government customers a fuller suite of services.
NSA Denies Impersonating Facebook To Serve Malware
News  |  3/14/2014  | 
Facebook's Zuckerberg speaks out after Snowden leak suggests NSA server posed as social media site to infect millions of computers with surveillance malware.
Windows XP Goes Dark: 5 Things To Expect
News  |  3/13/2014  | 
Microsoft customers face Windows XP's end-of-service deadline. How much will you suffer from the lack of support?
Berners-Lee Seeks Digital Bill Of Rights
Commentary  |  3/12/2014  | 
On the 25th anniversary of his proposal for the World Wide Web, Tim Berners-Lee wants Internet users to come to the Web's defense.
Windows XP Security Issues: Fact Vs. Fiction
News  |  3/12/2014  | 
Are you prepared for the end of Microsoft support for Windows XP next month?
Security Job #1 For Feds
Infographics  |  3/6/2014  | 
The 2014 InformationWeek Government IT Priorities Survey shows federal IT pros care about security - itís rated as very important by 69% of respondents, 30 percentage points ahead of the No. 2 priority, disaster recovery. Will the upcoming NIST cyber-security framework help manage risk?
Microsoft Lets Agencies Test Government-Only Cloud
News  |  3/5/2014  | 
Microsoft lets federal agencies take its newly operational Azure for Government for a "shakedown cruise."
Feds Grapple With Big Data Vs. Privacy
News  |  3/4/2014  | 
Government study focuses on how privacy-enhancing technologies and large-scale analytics will shape the future of big data.
Big Data Meets Threat Detection
Commentary  |  3/4/2014  | 
Security practitioners are getting a lot smarter about using security analytics and big data to identify threats in real-time. But there's a still a lot to learn.
Wearables At Work: Hello Big Brother?
Commentary  |  3/3/2014  | 
Employers must tread carefully with activity trackers and devices like Google Glass. Wearables could take real-time personal data collection to unnerving new heights.
9 Worst Cloud Security Threats
News  |  3/3/2014  | 
Leading cloud security group lists the "Notorious Nine" top threats to cloud computing in 2013; most are already known but defy 100% solution.
Cloud Security Needs More Layers: HyTrust
News  |  2/27/2014  | 
Eric Chiu, co-founder of HyTrust, says cloud operations will require "layered security" and encrypted virtual machines when at rest.
NSA Too Focused On Perimeter Defense, Clarke Says
News  |  2/26/2014  | 
The Former White House cybersecurity adviser says the NSA's focus on perimeter security made it vulnerable to insider Edward Snowden.
NSA Scandal Darkens Cloud Discussions At RSA
News  |  2/26/2014  | 
From Europe's efforts to create regulations for data localization to worries over the security of the cloud, the leaks of the past eight months have cast a shadow over cloud providers.
5 Reasons Security Certifications Matter
Commentary  |  2/26/2014  | 
Thereís a lot of buzz around how certs arenít important. Iím calling BS, and hereís why.
Government Cybersecurity Guidance Wanted By Private Sector
News  |  2/26/2014  | 
Nearly 90% of IT leaders worldwide believe government needs to be involved in helping private sector firms set cyber defense strategies, Dell study finds.
Mobile World Congress: Are Wearables More Fragile Than Fun?
Commentary  |  2/24/2014  | 
Mobile health apps and wearables on display at MWC are cool and beneficial, but privacy issues lie in wait.
Healthcare Devices: Security Researchers Sound Alarms
News  |  2/24/2014  | 
Default usernames, weak passwords, and widespread Windows XP Embedded systems are cause for concern, SANS Institute researchers say.
HIMSS Security Survey: Greatest Threat From Healthcare Insiders
News  |  2/19/2014  | 
The HIMSS survey of 283 IT and security professionals says the biggest concern is healthcare workers looking into electronic health records.
LinkedIn Privacy: 5 Safety Tips
News  |  2/18/2014  | 
Protect your LinkedIn account by browsing securely, keeping your activity private, and recognizing signs of malicious behavior.
Why Businesses Canít Ignore US Cybersecurity Framework
Commentary  |  2/14/2014  | 
Industry leaders and President Obama call the framework just a first step in creating a cybersecurity playbook for 16 US critical infrastructure sectors. But this is more than just a reference manual.
Feds Launch Cyber Security Guidelines For US Infrastructure Providers
News  |  2/12/2014  | 
The White House on Wednesday released the first version of its cyber security framework for protecting critical infrastructure. Critics say these voluntary guidelines enshrine the status quo.
TSA Baggage Scanners Hackable
News  |  2/12/2014  | 
Researchers reveal weak security that could allow malicious insiders or attackers to spoof the contents of carry-on baggage.
7 Reasons Federal Cybersecurity Hires Will Grow
Commentary  |  2/12/2014  | 
Government officials have recognized the importance of investing in human capital, not just technology, to confront cybersecurity crises.
Mask Spyware Outdoes Flame
News  |  2/11/2014  | 
Rare Spanish-speaking cyberespionage campaign uses spyware and malware tools that researchers call the most sophisticated yet.
Target Breach Takeaway: Secure Your Remote Access
Commentary  |  2/10/2014  | 
Yes, attackers could use stolen credentials to get into your systems from a distance. But slamming the door is not the answer.
Federal CIOs' Current Security Dilemma
Commentary  |  2/6/2014  | 
Three initiatives meant to improve government IT security are languishing from funding challenges, yet CIOs are asked to deliver on the promise of shared services.
Texas Hospital Discloses Huge Breach
News  |  2/5/2014  | 
St. Joseph Health System reports that as many as 405,000 records may have been compromised, but actual damage remains speculative.
10 Famous Facebook Flops
Slideshows  |  2/4/2014  | 
Facebook has suffered some ignominious strikeouts during its 10 years. Consider these 10 features and products that didn't fly.
New IRS Tax App: Invitation To Thieves?
News  |  2/3/2014  | 
A new IRS online tool let users view and print copies of past tax returns, but it could become a target for identity thieves.
Stop Harassing Google Employees
Commentary  |  1/25/2014  | 
The right to free speech isn't a license to threaten, harass, or intimidate.
Homeland Security Makes Cybersecurity A Managed Service
News  |  1/23/2014  | 
Einstein 3 intrusion prevention system analyzes traffic to and from executive-branch agencies to block threats at the ISP level.
Page 1 / 2   >   >>


The Agile Archive
The Agile Archive
When it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 - 2014
Our InformationWeek Elite 100 issue -- our 26th ranking of technology innovators -- shines a spotlight on businesses that are succeeding because of their digital strategies. We take a close at look at the top five companies in this year's ranking and the eight winners of our Business Innovation awards, and offer 20 great ideas that you can use in your company. We also provide a ranked list of our Elite 100 innovators.
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.