Related Webcasts
This Week's Issue
Free Print Subscription
SubscribeCurrent Government Issue
In this issue:
Subscribe Now
- Data Center Optimization: Federal agencies must increase server utilization and energy efficiency as they squeeze more computer processing into fewer data centers. We explore how the Army, Homeland Security, Veterans Affairs and others are doing that.
- Future Cities: The world's urban centers are growing, creating a civic management challenge of unprecedented scope and complexity. Our exclusive survey reveals the opportunities and challenges for city planners and municipal IT pros.
- Read the Current Issue











Commentary: Security
- RSS
- Facebook
- Twitter
Mathew J. Schwartz
Apple Security Talk Suggests iOS Limits
August 02, 2012 08:34 AM
Apple rightly earned plaudits for delivering a presentation on iOS security at Black Hat. But what was left unsaid may have revealed new details about its hush-hush app-review process.
Eric Lundquist
5 Black Hat Security Lessons For CIOs
July 27, 2012 01:10 PM
Beyond the bearded coders and men in black suits was a trove of security best practices for enterprise IT.
Mathew J. Schwartz
When Hackers Meet Girlfriends: Readers Judge Our Theory
July 24, 2012 08:30 AM
My modest proposal to deter law-breaking hackers by helping them get girlfriends sparked condemnation, support, and even marriage advice.
Jonathan Feldman
Dishonesty Flourishes Because We Enable It
July 23, 2012 01:58 PM
When IT holds the keys to our business-critical systems, employee dishonesty can have serious repercussions. Duke professor Dan Ariely says we're wrong about how to keep employees honest.
Jake McTigue
Virtualization And The Apple Effect
July 23, 2012 09:16 AM
Banking on black hats not targeting hypervisors was always a questionable idea. Now, it's downright dangerous.
George Crump
One Way To Avoid Cloud Outages
July 23, 2012 08:30 AM
Don't take chances with data availability. An onramping solution can help keep your customers--and your IT staff--happy.
Mathew J. Schwartz
One Secret That Stops Hackers: Girlfriends
July 16, 2012 11:43 AM
The majority of hackers "age out" of hacking as they get older and find girlfriends, families, and other responsibilities. Why not invest in educating young hackers sooner, instead of locking them up later?
David Johnson
4 Steps To A Successful BYOC Program
July 02, 2012 08:41 AM
Many employees are ready and willing to use their own computers to get work done. Consider these steps to launch a bring-your-own-computer program.
Mathew J. Schwartz
FTC Sets Consumer Data Collection Limits
June 27, 2012 11:32 AM
As Spokeo gets fined $800,000, FTC tries to enforce differences between consumer-reporting services and people-search services, which gather and sell large amounts of publicly accessible personal data.
Kurt Marko
Bromium Brings Hypervisor Security To Applications
June 21, 2012 09:06 AM
Startup aims to beef up performance and security in the data center by bringing virtualization to the next level--the application level.
Mathew J. Schwartz
Was U.S. Government's Stuxnet Brag A Mistake?
June 07, 2012 11:39 AM
Some lawmakers accuse Obama administration of failing to manage its secrets, but Stuxnet now stands as a warning of America's cyber-warfare capabilities.
Mathew J. Schwartz
Microsoft Bloatware Cleaning Offer Treats You Like Dirt
May 23, 2012 10:57 AM
For just $99, Microsoft will eliminate the junk added to its Windows 7 PCs by OEM manufacturers. Steve Jobs would have enjoyed this development.
Art Wittmann
Can IT Be Trusted With Personal Devices?
May 15, 2012 11:57 AM
Mobile device management as a path to security is a fundamentally flawed strategy. You must manage the data.
Mathew J. Schwartz
Has Anonymous Ruined Online Anonymity?
May 04, 2012 09:45 AM
Anonymous, the hacktivist collective, has given anonymity a bad name. Yes, anonymous online services may be used to send bomb threats or abusive messages, but anonymity also does some good online.
Mathew J. Schwartz
Google Wardriving: How Engineering Trumped Privacy
May 01, 2012 10:50 AM
Blame the Street View data collection practices on a "more is more" engineering mindset. And rethink your notions about privacy for unencrypted Wi-Fi data.
Jonathan Feldman
After Flashback, Apple Walled Gardens Won't Help
April 27, 2012 11:00 AM
Apple and other vendors will use the Flashback botnet as reason to move forward with desktop walled garden restrictions. Here's why that approach won't cut malware.
Mathew J. Schwartz
Mac Trojan Fallout: Apple Security Glory Days Gone?
April 19, 2012 09:00 AM
Apple's reputation as an unattractive target for malware writers changed when the Flashback trojan hit more than 600,000 Macs. But Windows security still looks worse.
Mathew J. Schwartz
Anonymous Vs. DNS System: Lessons For Enterprise IT
April 04, 2012 11:30 AM
A rumored attack on the world's DNS servers by Anonymous failed to materialize. But the many enterprises still ignoring persistent weaknesses could learn from the defensive strategy.
Thomas Claburn
Girls Around Me App: Not Today's Creepiest Stalker
April 04, 2012 08:45 AM
Was the Girls Around Me app tasteless and juvenile? Of course. But we should be far more concerned about being stalked by law enforcement agencies and our cell phone companies.
Jim Ditmore
Security Practices From The Front Lines
April 02, 2012 02:51 PM
In the age of LulzSec, industrial espionage, and everyday breaches, it's more important than ever to be proactive about security. These security measures and best practices will help keep your information safe.
Thomas Claburn
Google Big Tent: Regulation Vs. Personal Responsibility
March 30, 2012 09:50 AM
Society should embrace the touch-the-stove approach when it comes to online common sense, explains 14-year-old Adora Svitak, author of no less than three books and advocate of techno-youth empowerment, at Google event on Web regulation.
Debra Donston-Miller
Facebook Password Debate Stirs Deep Social Fears
March 27, 2012 11:35 AM
Recent controversy over prospective employers requesting Facebook credentials has dredged up some big social questions.
Thomas Claburn
Dear FTC: Privacy Power Trumps Privacy Rules
March 27, 2012 10:40 AM
As it tackles consumer data privacy, the FTC needs to think less about limiting what companies can do, and more about empowering consumers themselves.
David F. Carr
Social Phishing Spikes As Spam Declines, IBM Finds
March 26, 2012 10:34 AM
Improved Web application security leads attackers to be creative, reports IBM's X-Force Internet security team.
Jonathan Feldman
How To Make Information Security Everyone's Problem
March 26, 2012 09:05 AM
Use self-interest and propaganda to change employees' attitudes about endpoint security.