Government // Cybersecurity
News & Commentary
Clintonemail.com: A Cautionary Call To Action
Joe Stanganelli, Attorney, Beacon Hill Law
Commentary
As former Secretary of State Hillary Clinton becomes ever more embattled in the press and in politics because of her personal email usage, we can draw lessons for enterprises and employees alike on contending with Shadow IT.
By Joe Stanganelli Attorney, Beacon Hill Law, 3/23/2015
Comment3 comments  |  Read  |  Post a Comment
New Security Mindset: Focus On The Interior
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Chief privacy officer Jason Straight shares his insights on why organizations are struggling to stop the breach wave -- and manage the aftermath.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 3/18/2015
Comment7 comments  |  Read  |  Post a Comment
Clinton Email Fail: Worst Government Security Flubs
Joe Stanganelli, Attorney, Beacon Hill Law
News
Hillary Clinton isn't the first politician to have committed a data compliance faux pas when it comes to email. CIOs, compliance departments, and privacy officers would do well to learn from the mistakes of those who screwed up before her.
By Joe Stanganelli Attorney, Beacon Hill Law, 3/17/2015
Comment16 comments  |  Read  |  Post a Comment
Dark Reading Radio: Security Pros At Risk Of Being Criminalized
Kelly Jackson Higgins, Executive Editor at Dark Reading
Commentary
ICYMI: Check out Dark Reading Radio's recent broadcast and discussion about the pitfalls of new government efforts to fight bad hackers that could ultimately hurt the good guys.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 3/16/2015
Comment3 comments  |  Read  |  Post a Comment
BlackBerry, Samsung SecuTablet Offers Security For Business, Government Data
Eric Zeman,
Commentary
The SecuTablet is a Samsung Galaxy Tab S that's secured for governments and businesses by BlackBerry's Secusmart service.
By Eric Zeman , 3/16/2015
Comment2 comments  |  Read  |  Post a Comment
ISACs Demystified
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
How some intelligence-sharing organizations operate in the face of today's threat landscape.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 3/12/2015
Comment8 comments  |  Read  |  Post a Comment
Warrant Canaries: Watching US Agencies So IT Doesn't Have To
Joe Stanganelli, Attorney, Beacon Hill Law
Commentary
ISPs and others are unofficially sounding the alarm in the event that a US government agency is seeking access to user records. Here's why this matters to IT.
By Joe Stanganelli Attorney, Beacon Hill Law, 3/4/2015
Comment1 Comment  |  Read  |  Post a Comment
How Data Restrictions Hurt The Global Economy
Michael I. Roth, Chairman and CEO of The Interpublic Group of Companies, Inc. and Chair of the Business Roundtable Global IT Subcommittee.
Commentary
Many countries are creating policies to restrict the flow of data, driven by privacy or protectionist concerns. Such limits could stifle economic growth.
By Michael I. Roth Chairman and CEO of The Interpublic Group of Companies, Inc. and Chair of the Business Roundtable Global IT Subcommittee., 3/3/2015
Comment2 comments  |  Read  |  Post a Comment
Ramnit Botnet Disrupted By International Public-Private Collaboration
Sara Peters, Senior Editor at Dark Reading
News
Europol leads the effort to bring down the bank credential-stealing botnet that infected 3.2 million computers across the globe.
By Sara Peters Senior Editor at Dark Reading, 2/25/2015
Comment0 comments  |  Read  |  Post a Comment
Gemalto: NSA, GCHQ May Have Been Behind Breaches It Suffered In 2010 And 2011
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
But the 'sophisticated' attacks hit only Gemalto office networks--not 'massive theft' of SIM crypto keys, vendor says, and such an attack, if waged, would only affect 2G networks, not 3G or 4G.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/25/2015
Comment3 comments  |  Read  |  Post a Comment
Russian Hacker Who Hit Heartland, NASDAQ, Extradited To US
Sara Peters, Senior Editor at Dark Reading
News
Vladimir Drinkman, cohort of Albert Gonzalez, appears before US federal court after arrest and extradition by Dutch authorities.
By Sara Peters Senior Editor at Dark Reading, 2/18/2015
Comment2 comments  |  Read  |  Post a Comment
Why Kaspersky’s Bank Robbery Report Should Scare Us All
Susan Nunziata, Editorial Director
Commentary
So, you don't work for a financial institution? Don't think you're off the hook for the kind of theft discussed by Kaspersky. Banks are certainly not the only organizations moving around massive amounts of money every day.
By Susan Nunziata Editorial Director, 2/18/2015
Comment27 comments  |  Read  |  Post a Comment
Android To Become 'Workhorse' Of Cybercrime
Junko Yoshida,
Commentary
Android and Windows laptops dead even in infection rates for the year 2014.
By Junko Yoshida , 2/16/2015
Comment1 Comment  |  Read  |  Post a Comment
Obama, Tim Cook, Others Debate Sharing Cyber Security Data
Thomas Claburn, Editor at Large, Enterprise Mobility
News
The Obama White House wants more effective sharing of cyber security data between the public and private sectors. Despite some snubs, Apple's Tim Cook spoke at a special summit on the issue.
By Thomas Claburn Editor at Large, Enterprise Mobility, 2/14/2015
Comment6 comments  |  Read  |  Post a Comment
Anthem Hack: Lessons For IT Leaders
Joe Stanganelli, Attorney, Beacon Hill Law
Commentary
There are two key lessons that IT can learn from the Anthem breach.
By Joe Stanganelli Attorney, Beacon Hill Law, 2/12/2015
Comment26 comments  |  Read  |  Post a Comment
Smart Cars Vulnerable To Security Hacks, Report Finds
Eric Zeman,
Commentary
A US senator's report finds that carmakers are leaving vehicles open to intrusive attacks that can steal personal data and take over controls.
By Eric Zeman , 2/9/2015
Comment10 comments  |  Read  |  Post a Comment
White House Revises Rules For Intelligence Gathering
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Intelligence agencies like the NSA face data-retention limits and privacy training.
By Thomas Claburn Editor at Large, Enterprise Mobility, 2/3/2015
Comment3 comments  |  Read  |  Post a Comment
NSA Report: How To Defend Against Destructive Malware
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
In the wake of the Sony breach, spy agency's Information Assurance Directorate (IAD) arm provides best practices to mitigate damage of data annihilation attacks.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/22/2015
Comment3 comments  |  Read  |  Post a Comment
Enterprise Drones: What CIOs Should Know
Curtis Franklin Jr., Executive Editor, Technical Content
Commentary
Flying drones are coming to the enterprise: Will CIOs and the FAA be ready?
By Curtis Franklin Jr. Executive Editor, Technical Content, 1/16/2015
Comment16 comments  |  Read  |  Post a Comment
In Wake Of Violence, France Reports Spike In Cyberattacks
Sara Peters, Senior Editor at Dark Reading
News
19,000 French websites have been attacked since Jan. 7.
By Sara Peters Senior Editor at Dark Reading, 1/15/2015
Comment8 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest, Dec. 9, 2014
Apps will make or break the tablet as a work device, but don't shortchange critical factors related to hardware, security, peripherals, and integration.
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Flash Poll
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Slideshows
Twitter Feed
InformationWeek Radio
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
UBM's Future Cities
Latest Stories from UBM's Future Cities
View All from Future Cities