Government // Cybersecurity
News & Commentary
7 Arrested, 3 More Indicted For Roles in Cyber Fraud Ring That Stung StubHub
Sara Peters,
News
Arrests made in New York state, London, Toronto, and Spain for money laundering, grand larceny, and using StubHub customers' credit cards to buy and sell 3,500 e-tickets to prime events.
By Sara Peters , 7/23/2014
Comment0 comments  |  Read  |  Post a Comment
Federal IT Networks: Simpler Is Better
Elena Malykhina, Technology Journalist
News
A survey of government IT executives found that network complexity slows IT performance and hinders deployment of new technologies and services.
By Elena Malykhina Technology Journalist, 7/23/2014
Comment3 comments  |  Read  |  Post a Comment
Dark Reading Radio: The Winners & Losers of Botnet Takedowns
Sara Peters,
Commentary
Our guests are Cheri McGuire, VP of global government affairs and cyber security policy for Symantec, and Craig D. Spiezle, executive director and founder of the Online Trust Alliance.
By Sara Peters , 7/23/2014
Comment0 comments  |  Read  |  Post a Comment
Summer Travel Cyber Security Tips For Government Employees
Jerry Irvine,
Commentary
Vacationing as a government employee brings special security concerns. Follow these precautions to protect your devices and data on the beach and beyond.
By Jerry Irvine , 7/23/2014
Comment1 Comment  |  Read  |  Post a Comment
NY Seeks Bitcoin Exchange Regulations
William Jackson, Technology Writer
News
Proposal would require state's digital currency dealers to follow strict anti-money-laundering and consumer protection rules.
By William Jackson Technology Writer, 7/22/2014
Comment7 comments  |  Read  |  Post a Comment
Web Tracking Advances Beat Privacy Defenses
Thomas Claburn, Editor-at-Large
News
Technologies such as canvas fingerprinting, evercookies, and cookie syncing prompt new call for privacy regulation.
By Thomas Claburn Editor-at-Large, 7/22/2014
Comment6 comments  |  Read  |  Post a Comment
Government IT Priorities: Security Reigns, Cloud Crawls
Richard W. Walker,
News
Our new survey shows fed agencies focusing more on security, as they should, but they're still behind the times with cloud use, data center consolidation, and overall innovation.
By Richard W. Walker , 7/21/2014
Comment4 comments  |  Read  |  Post a Comment
Feds Pursue Cloud Forensics Standards
William Welsh, Contributing Writer
News
NIST identifies 65 challenges that forensic investigators face in gathering and analyzing digital information stored in the cloud, seeks help developing standards to aid law enforcement.
By William Welsh Contributing Writer, 7/17/2014
Comment1 Comment  |  Read  |  Post a Comment
Senate Hearing Calls for Changes to Cybercrime Law
Sara Peters,
News
In the wake of Microsoft's seizure of No-IP servers and domains, private and public sector representatives met to discuss what can be done to address the problem of botnets.
By Sara Peters , 7/16/2014
Comment10 comments  |  Read  |  Post a Comment
Federal Agencies Must Get Practical About Cloud
Elaine Beeman, Managing Director, Accenture Federal Services Management Consulting
Commentary
Government agencies are working through the realities of making cloud a routine mode of computing.
By Elaine Beeman Managing Director, Accenture Federal Services Management Consulting, 7/16/2014
Comment1 Comment  |  Read  |  Post a Comment
Data Breach Notification Law: Will Florida Lead?
Mac McMillan, CEO, CynergisTek
Commentary
Florida's stringent new breach notification law might encourage lawmakers to finally enact a federal standard.
By Mac McMillan CEO, CynergisTek, 7/16/2014
Comment2 comments  |  Read  |  Post a Comment
Can Privacy Survive Social Networking?
Tonia Allen Gould, Founder & CEO, Tagsource
Commentary
Sgrouples shows social networking doesn't have to mean surrendering personal data.
By Tonia Allen Gould Founder & CEO, Tagsource, 7/14/2014
Comment3 comments  |  Read  |  Post a Comment
Government Security: Saying 'No' Doesn't Work
Steve Jones, Group Strategy Director, Big Data & Analytics, Capgemini
Commentary
It's time for government agencies to move beyond draconian security rules and adopt anomaly analytics.
By Steve Jones Group Strategy Director, Big Data & Analytics, Capgemini, 7/14/2014
Comment0 comments  |  Read  |  Post a Comment
China Labels iPhone A Security Threat
Eric Zeman,
News
State media says the iPhone's ability to collect user location data is dangerous.
By Eric Zeman , 7/11/2014
Comment6 comments  |  Read  |  Post a Comment
HIPAA Compliance: What Every Developer Should Know
Jason Wang, Founder & CEO, TrueVault
Commentary
Apple Health and Google Fit have spurred a surge of interest in health apps. Here's what developers need to understand about HIPAA compliance.
By Jason Wang Founder & CEO, TrueVault, 7/11/2014
Comment2 comments  |  Read  |  Post a Comment
Global Law Enforcement, Security Firms Team Up, Take Down Shylock
Sara Peters,
News
À la GOZeuS, an international, public-private collaboration seizes a banking Trojan's command and control servers.
By Sara Peters , 7/10/2014
Comment3 comments  |  Read  |  Post a Comment
'Windows To Go' Device Wins Federal Cryptographic Certification
David F Carr, Editor, InformationWeek Healthcare
News
With FIPS 140-2 Level 3 certification, the Imation IronKey portable USB-based workspace becomes a mobility option for both civilian and military agencies.
By David F Carr Editor, InformationWeek Healthcare, 7/10/2014
Comment1 Comment  |  Read  |  Post a Comment
Controversial Cyber Security Bill Advances
Thomas Claburn, Editor-at-Large
News
Senate bill aims to promote information sharing to combat cyberthreats, but critics contend it lacks privacy protections.
By Thomas Claburn Editor-at-Large, 7/9/2014
Comment10 comments  |  Read  |  Post a Comment
Electronic Frontier Foundation Sues NSA, Director of National Intelligence
Sara Peters,
News
EFF says that the agencies have failed to provide documents requested under the Freedom of Information Act.
By Sara Peters , 7/8/2014
Comment2 comments  |  Read  |  Post a Comment
HIPAA Complaints Vex Healthcare Organizations
Alison Diana, Senior Editor
News
Since 2013, complaints to the Department of Health and Human Services have risen regarding Health Insurance Portability and Accountability Act violations.
By Alison Diana Senior Editor, 7/8/2014
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Flash Poll
Steal Our Slides
IT Salary Survey 2014: Insurance
IT Salary Survey 2014: Insurance
Insurance IT salaries are flat, but demand and compensation are highest for people with experience in social media, mobile, analytics, and cloud, according to InformationWeek's 2014 US IT Salary Survey.
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
A UBM Tech Radio episode on the changing economics of Flash storage used in data tiering -- sponsored by Dell.
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.