Government // Cybersecurity
News & Commentary
Wanted By DHS: Breakout Ideas On Domestic Cybersecurity
William Welsh, Contributing Writer
News
Department of Homeland Security plans to fund cyber defense research efforts to develop pragmatic tools that can be deployed quickly, says Forrester.
By William Welsh Contributing Writer, 9/2/2014
Comment0 comments  |  Read  |  Post a Comment
NIST Drafts Mobile App Security Guidelines
Richard W. Walker,
News
National Institute for Standards and Technology issues first draft of guidelines intended to help federal agencies balance benefits and risks of third-party mobile apps.
By Richard W. Walker , 8/28/2014
Comment5 comments  |  Read  |  Post a Comment
Breach of Homeland Security Background Checks Raises Red Flags
Sara Peters, Senior Editor at Dark Reading
News
"We should be burning down the house over this," says a GRC expert.
By Sara Peters Senior Editor at Dark Reading, 8/25/2014
Comment13 comments  |  Read  |  Post a Comment
Hacker Or Military? Best Of Both In Cyber Security
John B. Dickson, CISSP,  Principal, Denim Group
Commentary
How radically different approaches play out across the security industry.
By John B. Dickson CISSP, Principal, Denim Group, 8/21/2014
Comment6 comments  |  Read  |  Post a Comment
US House Inspector General: IT Audit Activist
David F Carr, Editor, InformationWeek Healthcare
News
At the 2014 GRC Conference, House IG Theresa Grafenstine argues internal auditors must be more forward looking -- and explains why being exempt from regulations just makes her job harder.
By David F Carr Editor, InformationWeek Healthcare, 8/20/2014
Comment4 comments  |  Read  |  Post a Comment
4 Tips: Protect Government Data From Mobile Malware
Julie M. Anderson, Managing Director, Civitas Group
Commentary
Mobile malware continues to proliferate, particularly on Android devices. These four steps help counter the threat.
By Julie M. Anderson Managing Director, Civitas Group, 8/20/2014
Comment2 comments  |  Read  |  Post a Comment
Nuclear Regulatory Commission Compromised 3 Times In Past 3 Years
Sara Peters, Senior Editor at Dark Reading
News
Unnamed actors try to swipe privileged credentials.
By Sara Peters Senior Editor at Dark Reading, 8/19/2014
Comment5 comments  |  Read  |  Post a Comment
Cybersecurity: How Involved Should Boards Of Directors Be?
David F Carr, Editor, InformationWeek Healthcare
News
Security audit groups ISACA and IIA weigh in on what role the board of directors should play in an enterprise's cybersecurity strategies.
By David F Carr Editor, InformationWeek Healthcare, 8/19/2014
Comment7 comments  |  Read  |  Post a Comment
NSA Collected More Records Than Court Allowed
Sara Peters, Senior Editor at Dark Reading
News
New documents show the Foreign Intelligence Surveillance Court is stumped by the NSA's "systemic overcollection."
By Sara Peters Senior Editor at Dark Reading, 8/13/2014
Comment5 comments  |  Read  |  Post a Comment
Microsoft Delays ActiveX Blocking In IE
Michael Endler, Associate Editor, InformationWeek.com
News
In response to customer concerns, Microsoft won't start blocking ActiveX controls in IE until September.
By Michael Endler Associate Editor, InformationWeek.com, 8/13/2014
Comment2 comments  |  Read  |  Post a Comment
NASA Mission: Cloud Governance
Henry Kenyon,
News
Here's how the space agency's Jet Propulsion Laboratory addressed governance, risk, and compliance for its critical public cloud services.
By Henry Kenyon , 8/13/2014
Comment0 comments  |  Read  |  Post a Comment
UK Reconsidering Biometrics
Sara Peters, Senior Editor at Dark Reading
News
Parliament is looking for answers about biometrics' privacy, security, future uses, and whether or not legislation is ready for what comes next.
By Sara Peters Senior Editor at Dark Reading, 8/12/2014
Comment4 comments  |  Read  |  Post a Comment
California Nears Smartphone Kill Switch
Eric Zeman,
News
Law would force phone makers to add remote kill switches; Apple, Google, and Microsoft have already agreed to implement them.
By Eric Zeman , 8/12/2014
Comment13 comments  |  Read  |  Post a Comment
Cyber Risk Dashboards: False Sense Of Control?
(ISC)2 Writers Bureau,
Commentary
Federal programs promoting the use of risk dashboards can boost real-time visibility, but only if they are used correctly.
By (ISC)2 Writers Bureau , 8/12/2014
Comment2 comments  |  Read  |  Post a Comment
Google To Factor Security In Search Results
Thomas Claburn, Editor-at-Large
News
Websites that don't support HTTPS connections may soon be less prominent in Google search results.
By Thomas Claburn Editor-at-Large, 8/7/2014
Comment3 comments  |  Read  |  Post a Comment
5 Breakthrough DARPA Technologies Beyond GPS
Elena Malykhina, Technology Journalist
News
Miniaturization, pulsed lasers, and quantum physics will bring new capabilities for positioning, navigation, and timing (PNT) to the battlefield.
By Elena Malykhina Technology Journalist, 8/7/2014
Comment4 comments  |  Read  |  Post a Comment
Dan Geer Touts Liability Policies For Software Vulnerabilities
Sara Peters, Senior Editor at Dark Reading
News
Vendor beware. At Black Hat, Dan Geer suggests legislation to change product liability and abandonment rules for vulnerable and unsupported software.
By Sara Peters Senior Editor at Dark Reading, 8/6/2014
Comment6 comments  |  Read  |  Post a Comment
5 Steps To Supply Chain Security
Robert Lemos, Technology Journalist
News
The integrity of enterprise data is only as strong as your most vulnerable third-party supplier or business partner. It's time to shore up these connection points.
By Robert Lemos Technology Journalist, 8/6/2014
Comment5 comments  |  Read  |  Post a Comment
BlackBerry Comeback Far From Certain
Michael Endler, Associate Editor, InformationWeek.com
News
BlackBerry is finally ready to resume growth, says CEO Chen -- but first the company must overcome its crumbling device business.
By Michael Endler Associate Editor, InformationWeek.com, 8/5/2014
Comment22 comments  |  Read  |  Post a Comment
Microsoft Privacy Case: What's At Stake?
Michael Endler, Associate Editor, InformationWeek.com
News
A ruling that Microsoft must turn over emails in a foreign data center could cost US businesses billions and make a mess of international law, experts say.
By Michael Endler Associate Editor, InformationWeek.com, 8/2/2014
Comment13 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek - September 2, 2014
Avoiding audits and vendor fines isn't enough. Take control of licensing to exact deeper software discounts and match purchasing to actual employee needs.
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Flash Poll
Steal Our Slides
IT Salary Survey 2014: Application Development
IT Salary Survey 2014: Application Development
Developers' raises matched or beat inflation in 2014, and middle-aged men working at large firms on the coasts fared best. Still, software development remains a well-paying field for everyone.
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
In in-depth look at InformationWeek's top stories for the preceding week.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.