Government // Cybersecurity
News & Commentary
Federal IT Security Policies Must Be User Friendly
James Bindseil,
Commentary
Federal agencies should choose security tools and policies that suit the productivity needs of their employees.
By James Bindseil , 4/16/2014
Comment1 Comment  |  Read  |  Post a Comment
'Baby Teeth' In Infrastructure Cyber Security Framework
Dave Frymier, Chief Information Security Officer, Unisys
Commentary
NISTís modest effort to improve lax security around IT infrastructure in airports, utilities, and other critical areas now heads to Congress. Don't hold your breath.
By Dave Frymier Chief Information Security Officer, Unisys, 4/14/2014
Comment6 comments  |  Read  |  Post a Comment
Luring The Elusive Cyber Security Pro
W. Hord Tipton,
Commentary
Struggling to find scarce IT security talent? Make sure your hiring managers understand the certifications and match candidates for skills fit -- not just credentials.
By W. Hord Tipton , 4/14/2014
Comment0 comments  |  Read  |  Post a Comment
Hacker Weev Free After Appeal
Thomas Claburn, Editor-at-Large
News
Andrew "Weev" Auernheimer, who embarrassed AT&T by exposing a security flaw, had his conviction overturned by federal appeals court.
By Thomas Claburn Editor-at-Large, 4/11/2014
Comment9 comments  |  Read  |  Post a Comment
Feds Address Antitrust Concerns On Cyberthreat Sharing
William Jackson, Technology Writer
News
Justice Dept. and FTC confirm that sharing cybersecurity threat information is not an antitrust law violation.
By William Jackson Technology Writer, 4/11/2014
Comment3 comments  |  Read  |  Post a Comment
ICANN Defends Internet Oversight Handoff
William Jackson, Technology Writer
News
Congress hears arguments for and against Commerce Department plans to give up control of many Internet operations.
By William Jackson Technology Writer, 4/10/2014
Comment2 comments  |  Read  |  Post a Comment
Flash Poll: Broken Heartbeat
Marilyn Cohodas, Community Editor, Dark Reading
Commentary
What steps do you plan to take in response to the Heartbleed bug? Take our poll and share your reasons in the comments.
By Marilyn Cohodas Community Editor, Dark Reading, 4/10/2014
Comment0 comments  |  Read  |  Post a Comment
Heartbleed: Examining The Impact
Tim Sapio, Security Analyst, Bishop Fox
Commentary
With Heartbleed, thereís little hope of knowing if an asset was breached, if a breach can be identified, or what, if any, data was leaked. Hereís how to defend against future attacks.
By Tim Sapio Security Analyst, Bishop Fox, 4/10/2014
Comment5 comments  |  Read  |  Post a Comment
Paul Allen Invests In Online Voting Firm
Elena Malykhina, Technology Journalist
News
E-voting firm Scytl receives $40 million from Paul Allen's Vulcan Capital to continue election modernization efforts. Defense Department among its customers.
By Elena Malykhina Technology Journalist, 4/9/2014
Comment5 comments  |  Read  |  Post a Comment
One Year Later: The APT1 Report
Nick Selby, CEO, StreetCred Software, Inc
Commentary
One of the most positive impacts of APT1 is the undeniable rise in the stature of the threat intelligence industry. "Threat Intelligence" is the SIEM, the NAC of 2014.
By Nick Selby CEO, StreetCred Software, Inc, 4/8/2014
Comment2 comments  |  Read  |  Post a Comment
FTC Privacy Enforcement Power Wins Court Blessing
Thomas Claburn, Editor-at-Large
News
The agency's claim against Wyndham Hotels for poor data security practices has been allowed to proceed.
By Thomas Claburn Editor-at-Large, 4/8/2014
Comment0 comments  |  Read  |  Post a Comment
NSAís Big Surprise: Govít Agency Is Actually Doing Its Job
Ira Winkler,
Commentary
When people claimed after 9/11 that the NSA was ill equipped to deal with a changing world, I wonder what they expected to happen.
By Ira Winkler , 4/4/2014
Comment14 comments  |  Read  |  Post a Comment
Advanced Persistent Threats: What Are They, Really?
Sara Peters,
CommentaryVideo
There seem to be as many definitions of APT as there are actual APTs. So what is an advanced persistent threat, really?
By Sara Peters , 4/4/2014
Comment0 comments  |  Read  |  Post a Comment
Federal Agencies Fail To Protect Personal Data
Elena Malykhina, Technology Journalist
News
Government agencies have inconsistently responded to both cyber and non-cyber incidents, a watchdog group says.
By Elena Malykhina Technology Journalist, 4/3/2014
Comment3 comments  |  Read  |  Post a Comment
What Enterprise IT Can Learn From Industrial Engineering
Stephanie C. Hill, Vice President and General Manager, Lockheed Martin Information Systems & Global Solutions, Civil
Commentary
Budget-challenged IT organizations would do well to adopt the efficiency policies of industrial engineering. It applies efficiencies across enterprise operations, not just in specific areas.
By Stephanie C. Hill Vice President and General Manager, Lockheed Martin Information Systems & Global Solutions, Civil, 4/1/2014
Comment1 Comment  |  Read  |  Post a Comment
Feds To Improve Threat Information Sharing
William Jackson, Technology Writer
News
Project Interoperability aims to develop and standardize formats for sharing security and threat information among organizations.
By William Jackson Technology Writer, 3/31/2014
Comment3 comments  |  Read  |  Post a Comment
Samsung Chips Away At BlackBerry's Government Business
Randy Siegel, Founder, Center Circle Consultants
Commentary
BlackBerry continues to raise the mobile security bar at the Defense Department, but Samsung and others are making inroads in government mobile business.
By Randy Siegel Founder, Center Circle Consultants, 3/28/2014
Comment3 comments  |  Read  |  Post a Comment
BlackBerry 10 Gets Defense Department Approval
Elena Malykhina, Technology Journalist
News
BlackBerry becomes first mobile vendor to get full operational authority to run on DOD networks.
By Elena Malykhina Technology Journalist, 3/28/2014
Comment0 comments  |  Read  |  Post a Comment
Amazon Cloud Services Wins DoD Authorization
William Jackson, Technology Writer
News
Amazon gets provisional operating authorization to sell cloud services to the Defense Department for work involving low-risk unclassified data.
By William Jackson Technology Writer, 3/27/2014
Comment7 comments  |  Read  |  Post a Comment
A Cyber History Of The Ukraine Conflict
John Bumgarner, Chief Technology Officer for the U.S. Cyber Consequences Unit
Commentary
The CTO for the US Cyber Consequences Unit offers a brief lesson in Russian geopolitics and related cyber flare-ups, and explains why we should be concerned.
By John Bumgarner Chief Technology Officer for the U.S. Cyber Consequences Unit, 3/27/2014
Comment5 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for InformationWeek Newsletters
White Papers
Current Issue
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Flash Poll
Steal Our Slides
2014 State of Storage Survey
2014 State of Storage Survey
If you look at vendor financials, the enterprise storage business seems stuck in neutral. Don't believe it.
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.