News & Commentary
Latest Content tagged with Attacks & Breaches
Page 1 / 2   >   >>
Hacker Weev Free After Appeal
News  |  4/11/2014  | 
Andrew "Weev" Auernheimer, who embarrassed AT&T by exposing a security flaw, had his conviction overturned by federal appeals court.
Feds Address Antitrust Concerns On Cyberthreat Sharing
News  |  4/11/2014  | 
Justice Dept. and FTC confirm that sharing cybersecurity threat information is not an antitrust law violation.
Heartbleed: Making The Case For SDN
Commentary  |  4/10/2014  | 
Software-defined networking technology could help protect against vulnerabilities like Heartbleed. It's time to develop a more mature SDN option.
Unisys Stealth Makes Sensitive Data Go Dark
News  |  4/8/2014  | 
Can you make data invisible to intruders? Unisys Stealth system creates a community around sensitive data and encrypts communications between all users.
Windows XP Plug Pulled: 5 Questions
News  |  4/8/2014  | 
After 12 years, Windows XP officially becomes an unsupported OS. Here's what you need to know, from old PCs to dicey ATMs.
Colleagues In Cuffs: When Employees Steal Patient Records
News  |  4/7/2014  | 
The Queens County DA recently arrested two Jamaica Hospital employees for stealing patient data, a lucrative crime occurring at hospitals across the nation.
VMware Touts Virtualization For Datacenter Security
News  |  4/4/2014  | 
Hypervisor-based security would be like Goldilocks -- "not too hot, not too cold" -- when it comes to halting malware and intruders well inside the enterprise perimeter, say VMware leaders at Interop.
Federal Agencies Fail To Protect Personal Data
News  |  4/3/2014  | 
Government agencies have inconsistently responded to both cyber and non-cyber incidents, a watchdog group says.
Feds To Improve Threat Information Sharing
News  |  3/31/2014  | 
Project Interoperability aims to develop and standardize formats for sharing security and threat information among organizations.
Cybercrime Black Markets Grow Up
News  |  3/26/2014  | 
Cybercrime forums selling advanced attacks on demand are outpacing businesses' ability to defend themselves, new study from RAND finds.
Internet Of Things Meets Cars: Security Threats Ahead
News  |  3/18/2014  | 
As the Internet of Things extends to automobiles, security and privacy threats come along for the ride.
NSA Denies Impersonating Facebook To Serve Malware
News  |  3/14/2014  | 
Facebook's Zuckerberg speaks out after Snowden leak suggests NSA server posed as social media site to infect millions of computers with surveillance malware.
Windows XP Security Issues: Fact Vs. Fiction
News  |  3/12/2014  | 
Are you prepared for the end of Microsoft support for Windows XP next month?
Security Job #1 For Feds
Infographics  |  3/6/2014  | 
The 2014 InformationWeek Government IT Priorities Survey shows federal IT pros care about security - itís rated as very important by 69% of respondents, 30 percentage points ahead of the No. 2 priority, disaster recovery. Will the upcoming NIST cyber-security framework help manage risk?
Big Data Meets Threat Detection
Commentary  |  3/4/2014  | 
Security practitioners are getting a lot smarter about using security analytics and big data to identify threats in real-time. But there's a still a lot to learn.
Cloud Security Needs More Layers: HyTrust
News  |  2/27/2014  | 
Eric Chiu, co-founder of HyTrust, says cloud operations will require "layered security" and encrypted virtual machines when at rest.
NSA Too Focused On Perimeter Defense, Clarke Says
News  |  2/26/2014  | 
The Former White House cybersecurity adviser says the NSA's focus on perimeter security made it vulnerable to insider Edward Snowden.
5 Reasons Security Certifications Matter
Commentary  |  2/26/2014  | 
Thereís a lot of buzz around how certs arenít important. Iím calling BS, and hereís why.
Why Businesses Canít Ignore US Cybersecurity Framework
Commentary  |  2/14/2014  | 
Industry leaders and President Obama call the framework just a first step in creating a cybersecurity playbook for 16 US critical infrastructure sectors. But this is more than just a reference manual.
Feds Launch Cyber Security Guidelines For US Infrastructure Providers
News  |  2/12/2014  | 
The White House on Wednesday released the first version of its cyber security framework for protecting critical infrastructure. Critics say these voluntary guidelines enshrine the status quo.
Labs Must Protect Newly Portable Patient Data
News  |  2/12/2014  | 
Now that the Department of Health and Human Services has ruled that consumers can get their medical test results, labs' IT departments must give security and privacy top priority.
Mask Spyware Outdoes Flame
News  |  2/11/2014  | 
Rare Spanish-speaking cyberespionage campaign uses spyware and malware tools that researchers call the most sophisticated yet.
Target Breach Takeaway: Secure Your Remote Access
Commentary  |  2/10/2014  | 
Yes, attackers could use stolen credentials to get into your systems from a distance. But slamming the door is not the answer.
Texas Hospital Discloses Huge Breach
News  |  2/5/2014  | 
St. Joseph Health System reports that as many as 405,000 records may have been compromised, but actual damage remains speculative.
The DDoS Smash-And-Grab: Be Prepared
Commentary  |  1/22/2014  | 
You are more likely to fall victim to a DDoS attack as each day passes. Assume you will be a hacker's target, and get ready with a remediation plan.
Defense Dept. Calls For Expanded Nuclear Monitoring
News  |  1/22/2014  | 
US must ramp up surveillance and big data analytics tools to meet challenge of global nuclear proliferation monitoring, warns DOD Defense Science Board report.
A Tale Of Two Cyberheists
Commentary  |  1/22/2014  | 
Both Target and SnapChat recently fell victim to high-profile security breaches, but the long-term damage to SnapChat will be much greater. Here's why.
3 Reasons Security Pros Are In The Driverís Seat Now
Commentary  |  1/17/2014  | 
The coming weeks are the perfect time to ask for a raise or find the job of your dreams. Don't let a perfect storm of security problems go to waste.
Top 10 Retail CIO Priorities For 2014
Slideshows  |  1/15/2014  | 
NRF Big Show 2014 serves up a wealth of advice for retail tech leaders looking to embrace digital commerce, adopt a mobile-first strategy, and take advantage of big data.
Feds Get Mixed Report Card On Data Breaches
News  |  1/10/2014  | 
A Government Accountability Office study recommends that agencies improve the way they respond to data breaches; new guidelines are en route.
LinkedIn Sues After Scraping Of User Data
News  |  1/8/2014  | 
LinkedIn wants Amazon to turn over names of people it says registered fake LinkedIn accounts to extract users' data.
Is Your Security Program Effective? 7 Must-Ask Questions
Commentary  |  1/8/2014  | 
Business leaders can, and should, insist on metrics to prove protection efforts are worth the money.
Security Guru Bruce Schneier Joins Startup Co3
News  |  1/6/2014  | 
Schneier calls new gig at incident response management vendor a natural progression.
7 InfoSec Predictions For 2014: Good, Bad & Ugly
Commentary  |  1/3/2014  | 
First, the bad news: Windows XP doomsday, escalating ransomware, botnet-driven attacks, emerging SDN threats. The good news: Threat intelligence goes mainstream.
NSA Elite Hackers Infiltrated Network Equipment
News  |  1/2/2014  | 
A treasure trove of tools used by NSA hackers for planting backdoors via Cisco, Juniper, and Apple products was unveiled in the latest document leaks from the agency.
U.S. Citizens More Worried About ID Theft Than Privacy
News  |  12/27/2013  | 
Despite NSA scare, U.S. voters are five times more concerned about hacking than tracking, CCIA study says.
10 Biggest Tech Disappointments Of 2013
Slideshows  |  12/27/2013  | 
From HealthCare.gov to the Galaxy Gear smartwatch, here are some of the year's biggest letdowns.
Top 15 Government Technology Stories of 2013
News  |  12/26/2013  | 
From robots to Obamacare, here are the 15 most popular InformationWeek government tech stories from 2013.
Healthcare Data Breaches To Surge In 2014
News  |  12/26/2013  | 
The healthcare industry will see even bigger breaches of data and patient privacy in 2014, an Experian report says.
Using NetFlow Data For Robust Network Security
News  |  12/24/2013  | 
NetFlow analytic data can spot dangerous traffic patterns including anomalous "hot-spots" of activity and compromised hosts.
5 Trends For Health CIOs In 2014
News  |  12/23/2013  | 
Patient portals, direct messaging, and medical identity theft will keep healthcare execs on their toes in the new year.
Energy Department Breach Years In Making, Investigators Say
News  |  12/13/2013  | 
July data breach that affected up to 150,000 employees traces back to a string of managerial and technical failures, investigators conclude.
DDoS Attacks Wreak Havoc On Data Centers
News  |  12/12/2013  | 
Distributed-denial-of-service attacks are a growing cause of costly data center outages, according to a new study.
Beware LinkedIn Invitations, Mail Delivery Messages
News  |  12/12/2013  | 
Phishers favor emails that appear to be from LinkedIn friends or email systems, study says.
Cybercriminals Enlist Database Cloud Services
News  |  12/12/2013  | 
Database-as-a-service supports a new Trojan-based attack that steals businesses' online banking credentials.
NIST Cybersecurity Framework: Donít Underestimate It
Commentary  |  12/9/2013  | 
A cybersecurity framework for critical infrastructure owners is voluntary but will become the de facto standard for litigators and regulators. Here's how to prepare.
DARPA Cyber Defense Challenge: $2 Million Prize
News  |  12/9/2013  | 
Defense research agency's Cyber Grand Challenge aims to close the gap between vulnerability discovery and remediation.
Huawei Backs Out Of US Switch Market
News  |  12/4/2013  | 
Chinese switch maker Huawei calls it quits in the US market, again, amid cyber espionage and conspiracy concerns.
Microsoft Launches Cybercrime Center
News  |  12/4/2013  | 
Microsoft expands global role supporting law enforcement, government, and businesses fighting cybercrime.
US Moving From Technology Leader To Laggard
Commentary  |  12/2/2013  | 
R&D, science, and technology investments aren't keeping pace with other nations -- and face growing risks from cybertheft, according to government reports.
Page 1 / 2   >   >>


The Agile Archive
The Agile Archive
When it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 - 2014
Our InformationWeek Elite 100 issue -- our 26th ranking of technology innovators -- shines a spotlight on businesses that are succeeding because of their digital strategies. We take a close at look at the top five companies in this year's ranking and the eight winners of our Business Innovation awards, and offer 20 great ideas that you can use in your company. We also provide a ranked list of our Elite 100 innovators.
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.