Government // Cybersecurity
News & Commentary
What Healthcare Can Learn From CHS Data Breach
Paula Knippa, Attorney
Commentary
Security breach that exposed personal data on 4.5 million Tennessee healthcare system patients offers key lessons to prevent similar cyber attacks.
By Paula Knippa Attorney, 11/25/2014
Comment1 Comment  |  Read  |  Post a Comment
USPS Played Cat And Mouse With Cyber Attacker
Jai Vijayan, Freelance writer
News
Postal Service takes restrained, methodical approach to cyberattack. Was this the right strategy?
By Jai Vijayan Freelance writer, 11/24/2014
Comment4 comments  |  Read  |  Post a Comment
Ghostery Makes Privacy Marketable
Thomas Claburn, Editor-at-Large
News
Service that blocks Web tracking code turns out to be good for business, too.
By Thomas Claburn Editor-at-Large, 11/24/2014
Comment4 comments  |  Read  |  Post a Comment
Open Source Vs. Proprietary: Time For A New Manifesto
Kurt Marko, Contributing Editor
News
Philosophical debates over OpenStack vs. vCloud or OpenDaylight vs. Cisco ACI miss the point. For IT, ideological purity is neither possible nor desirable
By Kurt Marko Contributing Editor, 11/20/2014
Comment5 comments  |  Read  |  Post a Comment
7 Important Tech Regulatory Issues In 2015
Elena Malykhina, Technology Journalist
News
From net neutrality to patent reform and drones, these regulations will be in the spotlight. See what's at stake.
By Elena Malykhina Technology Journalist, 11/19/2014
Comment3 comments  |  Read  |  Post a Comment
TRUSTe Not So Trustworthy
Thomas Claburn, Editor-at-Large
News
Privacy certification company has agreed to pay $200,000 to settle FTC charges that it deceived consumers.
By Thomas Claburn Editor-at-Large, 11/17/2014
Comment0 comments  |  Read  |  Post a Comment
DoD Changes Cloud Computing Policy
Henry Kenyon,
News
Changing culture is just as important as new technology, CIO Halvorsen says.
By Henry Kenyon , 11/17/2014
Comment2 comments  |  Read  |  Post a Comment
NOAA Blames China In Hack, Breaks Disclosure Rules
Sara Peters, Senior Editor at Dark Reading
News
The National Oceanic and Atmospheric Administration finally confirms that four websites were attacked and taken down in September, but details are sketchy and officials want answers.
By Sara Peters Senior Editor at Dark Reading, 11/13/2014
Comment2 comments  |  Read  |  Post a Comment
ATP: Don't Give Up On Prevention
Marc van Zadelhoff, IBM Securityís Vice President of Worldwide Strategy and Product Management
Commentary
As businesses rely on more complex systems with more tools from different vendors, traditional security measures are becoming increasingly inadequate.
By Marc van Zadelhoff IBM Securityís Vice President of Worldwide Strategy and Product Management, 11/13/2014
Comment9 comments  |  Read  |  Post a Comment
The Enemy Who Is Us: DoD Puts Contractors On Notice For Insider Threats
Adam Firestone, President & GM, Kaspersky Government Security Solutions
Commentary
New rule requires US government contractors to gather and report information on insider threat activity on classified networks.
By Adam Firestone President & GM, Kaspersky Government Security Solutions, 11/13/2014
Comment5 comments  |  Read  |  Post a Comment
Americans Doubt They Can Protect Their Privacy
Thomas Claburn, Editor-at-Large
News
A Pew Research Center study finds broad concern about government and corporate data gathering, along with a desire for more government regulation of data gathering.
By Thomas Claburn Editor-at-Large, 11/13/2014
Comment8 comments  |  Read  |  Post a Comment
Stuxnet 'Patient Zero' Attack Targets Revealed
Sara Peters, Senior Editor at Dark Reading
News
Researchers name five Iranian industrial control systems companies attacked in 2009-2010, and they question whether USB sticks were really the method of infection.
By Sara Peters Senior Editor at Dark Reading, 11/11/2014
Comment5 comments  |  Read  |  Post a Comment
IBM Launches Cross-Cloud Security Protection
Charles Babcock, Editor At Large, InformationWeek
News
IBM's Dynamic Cloud Security can monitor and analyze data access activity and applications in IBM SoftLayer, Salesforce.com, and Amazon.
By Charles Babcock Editor At Large, InformationWeek , 11/5/2014
Comment1 Comment  |  Read  |  Post a Comment
Cyberspace Expands Threat Matrix
Patience Wait,
News
National security experts warn there is no privacy or security any more.
By Patience Wait , 11/3/2014
Comment1 Comment  |  Read  |  Post a Comment
Facebook Adds Tor Support
Thomas Claburn, Editor-at-Large
News
Facebook wants to allow people to use its service without being watched or censored. Is that some kind of privacy oxymoron?
By Thomas Claburn Editor-at-Large, 10/31/2014
Comment3 comments  |  Read  |  Post a Comment
Cyber Security Law Vs. Partisan Politics
W. Hord Tipton,
Commentary
Cyber security sometimes turns up as a campaign issue, but effective legislation has stalled. It's time for a rational approach to regaining trust in our digital world.
By W. Hord Tipton , 10/31/2014
Comment4 comments  |  Read  |  Post a Comment
Retailers Now Actively Sharing Cyberthreat Intelligence
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
The retail industry's R-CISC has been up and running for four months now and is looking for more retailers to sign up.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/30/2014
Comment8 comments  |  Read  |  Post a Comment
VA Buckles Down On Cyber Security, Program Management
Henry Kenyon,
News
Agency refocuses IT priorities on data protection, on-time project delivery to overcome past poor performance.
By Henry Kenyon , 10/30/2014
Comment0 comments  |  Read  |  Post a Comment
White House Says Unclassified Network Hit In Cyberattack
Jai Vijayan, Freelance writer
News
Mitigation efforts have caused temporary outages and loss of connectivity for some staff, but no computers have been damaged, official says.
By Jai Vijayan Freelance writer, 10/29/2014
Comment2 comments  |  Read  |  Post a Comment
Dear Elon Musk: AI Demon Not Scariest
Thomas Claburn, Editor-at-Large
Commentary
Elon Musk sees AI as a threat to our existence. I see more immediate problems.
By Thomas Claburn Editor-at-Large, 10/29/2014
Comment8 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest, Nov. 10, 2014
Just 30% of respondents to our new survey say their companies are very or extremely effective at identifying critical data and analyzing it to make decisions, down from 42% in 2013. What gives?
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Flash Poll
Steal Our Slides
InformationWeek 2014 Healthcare IT Priorities Survey
InformationWeek 2014 Healthcare IT Priorities Survey
Health IT pros are focused on government mandates and programs, which leaves little time to optimize the new technology they've added over the last few years.
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 16, 2014.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.