Government // Cybersecurity
News & Commentary
FCC In-Flight Cellphone Ban: Fight's On
Ellis Booker, Technology Journalist
News
Lobbyists and legislators urge the FCC not to reverse its 23-year-old ban on using cellphones during airline flight.
By Ellis Booker Technology Journalist, 9/17/2014
Comment1 Comment  |  Read  |  Post a Comment
Open Source Fix For US Voting System?
David F Carr, Editor, InformationWeek Government/Healthcare
Commentary
Open source programmers and maverick election officials want to improve the way we vote, register to vote, and count the votes. Wish them luck.
By David F Carr Editor, InformationWeek Government/Healthcare, 9/16/2014
Comment2 comments  |  Read  |  Post a Comment
The Security Skills Shortage No One Talks About
Jeremy Bergsman & Emma Kinnucan, CEB
Commentary
Lack of soft skills in information security is an even bigger problem than the shortage of technical expertise.
By Jeremy Bergsman & Emma Kinnucan CEB, 9/16/2014
Comment3 comments  |  Read  |  Post a Comment
Dyre Straits: Why This Cloud Attack's Different
Kaushik Narayan, Co-Founder and CTO at Skyhigh Networks
Commentary
Dyre is a new breed of Trojan, attacking cloud apps and using the cloud as a delivery vehicle.
By Kaushik Narayan Co-Founder and CTO at Skyhigh Networks, 9/12/2014
Comment3 comments  |  Read  |  Post a Comment
Feds Hesitate Moving IT Services To The Cloud
Elena Malykhina, Technology Journalist
News
Government IT execs compare transitioning data to the cloud to giving their kids the keys to a new convertible.
By Elena Malykhina Technology Journalist, 9/11/2014
Comment1 Comment  |  Read  |  Post a Comment
Apple iCloud Hack's Other Victim: Cloud Trust
Charles Babcock, Editor At Large, InformationWeek
Commentary
Our flash poll finds users feel more vulnerable about cloud security in general. No wonder: Apple's opening statement of indignation now sounds a little hollow.
By Charles Babcock Editor At Large, InformationWeek , 9/10/2014
Comment2 comments  |  Read  |  Post a Comment
Blinders For Google Glass
Thomas Claburn, Editor-at-Large
News
Cyborg Unplug promises to boot Google Glass and other surveillance devices from local networks.
By Thomas Claburn Editor-at-Large, 9/9/2014
Comment6 comments  |  Read  |  Post a Comment
Cross-Border Digital Searches: An Innovation-Friendly Approach
Daniel Castro, Senior Analyst, Information Technology and Innovation Foundation
Commentary
Case between the US government and Microsoft reveals the shortcomings of current laws.
By Daniel Castro Senior Analyst, Information Technology and Innovation Foundation, 9/5/2014
Comment1 Comment  |  Read  |  Post a Comment
Cyber Security Education: Remove The Limits
W. Hord Tipton,
Commentary
Highly technical and high-level strategic education must come together to achieve cyber security goals.
By W. Hord Tipton , 9/4/2014
Comment6 comments  |  Read  |  Post a Comment
Secure The Core: Advice For Agencies Under Attack
Vijay Basani, CEO, EiQ Networks
Commentary
When facing state-sponsored attacks, perimeter security is never enough.
By Vijay Basani CEO, EiQ Networks, 9/3/2014
Comment2 comments  |  Read  |  Post a Comment
Wanted By DHS: Breakout Ideas On Domestic Cybersecurity
William Welsh, Contributing Writer
News
Department of Homeland Security plans to fund cyber defense research efforts to develop pragmatic tools that can be deployed quickly, says Forrester.
By William Welsh Contributing Writer, 9/2/2014
Comment1 Comment  |  Read  |  Post a Comment
NIST Drafts Mobile App Security Guidelines
Richard W. Walker,
News
National Institute for Standards and Technology issues first draft of guidelines intended to help federal agencies balance benefits and risks of third-party mobile apps.
By Richard W. Walker , 8/28/2014
Comment5 comments  |  Read  |  Post a Comment
Breach of Homeland Security Background Checks Raises Red Flags
Sara Peters, Senior Editor at Dark Reading
News
"We should be burning down the house over this," says a GRC expert.
By Sara Peters Senior Editor at Dark Reading, 8/25/2014
Comment13 comments  |  Read  |  Post a Comment
Hacker Or Military? Best Of Both In Cyber Security
John B. Dickson, CISSP,  Principal, Denim Group
Commentary
How radically different approaches play out across the security industry.
By John B. Dickson CISSP, Principal, Denim Group, 8/21/2014
Comment6 comments  |  Read  |  Post a Comment
US House Inspector General: IT Audit Activist
David F Carr, Editor, InformationWeek Government/Healthcare
News
At the 2014 GRC Conference, House IG Theresa Grafenstine argues internal auditors must be more forward looking -- and explains why being exempt from regulations just makes her job harder.
By David F Carr Editor, InformationWeek Government/Healthcare, 8/20/2014
Comment4 comments  |  Read  |  Post a Comment
4 Tips: Protect Government Data From Mobile Malware
Julie M. Anderson, Managing Director, Civitas Group
Commentary
Mobile malware continues to proliferate, particularly on Android devices. These four steps help counter the threat.
By Julie M. Anderson Managing Director, Civitas Group, 8/20/2014
Comment2 comments  |  Read  |  Post a Comment
Nuclear Regulatory Commission Compromised 3 Times In Past 3 Years
Sara Peters, Senior Editor at Dark Reading
News
Unnamed actors try to swipe privileged credentials.
By Sara Peters Senior Editor at Dark Reading, 8/19/2014
Comment5 comments  |  Read  |  Post a Comment
Cybersecurity: How Involved Should Boards Of Directors Be?
David F Carr, Editor, InformationWeek Government/Healthcare
News
Security audit groups ISACA and IIA weigh in on what role the board of directors should play in an enterprise's cybersecurity strategies.
By David F Carr Editor, InformationWeek Government/Healthcare, 8/19/2014
Comment7 comments  |  Read  |  Post a Comment
NSA Collected More Records Than Court Allowed
Sara Peters, Senior Editor at Dark Reading
News
New documents show the Foreign Intelligence Surveillance Court is stumped by the NSA's "systemic overcollection."
By Sara Peters Senior Editor at Dark Reading, 8/13/2014
Comment5 comments  |  Read  |  Post a Comment
Microsoft Delays ActiveX Blocking In IE
Michael Endler, Associate Editor, InformationWeek.com
News
In response to customer concerns, Microsoft won't start blocking ActiveX controls in IE until September.
By Michael Endler Associate Editor, InformationWeek.com, 8/13/2014
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest September 18, 2014
Enterprise social network success starts and ends with integration. Here's how to finally make collaboration click.
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Flash Poll
Steal Our Slides
IT Salary Survey 2014
IT Salary Survey 2014
IT pros are feeling optimistic again about their careers. Raises are up, and median total compensation hit $92,000 for staffers and $120,000 for managers in 2014, according to InformationWeek's annual survey.
Slideshows
Twitter Feed
InformationWeek Radio
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.