Hot stories this week include saying 'No' to crypto backdoors for law enforcement, new roles for IT on Wall Street, and more.By Andrew Conry Murray Director of Content & Community, Interop, 10/24/20140 comments | Read | Post a Comment
Department of Homeland Security reportedly investigating two-dozen products from major medical device manufacturers for security holes.By Jai Vijayan Freelance writer, 10/23/20141 Comment | Read | Post a Comment
Putting data encryption solely into the hands of government employees won't prevent bad things from happening -- and it might encourage wrongdoing.By Jonathan Feldman CIO, City of Asheville, NC, 10/22/201412 comments | Read | Post a Comment
If IoT is ever going to work, networks will have to grant access to devices that we'd refuse outright today. By Patrick Hubbard Head Geek & Senior Technical Product Marketing Manager, SolarWinds, 10/20/20142 comments | Read | Post a Comment
Automakers should consider adding real-time intrusion detection and response capabilities, National Highway Traffic Safety Administration says.By Jai Vijayan Freelance writer, 10/13/20141 Comment | Read | Post a Comment
A new report explains that online voting in the US is a matter of "if, not when," but problems of anonymity and verifiability must be solved first.By Sara Peters Senior Editor at Dark Reading, 10/9/20147 comments | Read | Post a Comment
Twitter claims the government is restricting its free speech by limiting what it can disclose about requests for customer data.By Jai Vijayan Freelance writer, 10/9/20144 comments | Read | Post a Comment
Immigration and Customs Enforcement launches Android and Spanish-language versions of Operation Predator, a mobile app the public can use to help the agency catch child predators.By Elena Malykhina Technology Journalist, 10/8/20141 Comment | Read | Post a Comment
The DHS contributes $23.5 million toward the Software Assurance Market Place to enable software developers to test open source programs and improve software analysis tools.By William Jackson Technology Writer, 10/8/20140 comments | Read | Post a Comment
The SAFETY Act can offer a layer of legal protection for cyber security vendors, providers, and enterprise security policies in the wake of an attack, an attorney says.By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/8/20141 Comment | Read | Post a Comment
In an effort to tap commercial cloud technology without sacrificing security or control, the Department of Defense considers two potential models.By Jai Vijayan Freelance writer, 10/3/20140 comments | Read | Post a Comment
Department of Energy has released a set of voluntary privacy recommendations for smart grid owners, operators, and third parties; industry stakeholders have until October 14 to comment on draft.By Jai Vijayan Freelance writer, 9/29/20141 Comment | Read | Post a Comment
The Bash bug is everywhere, including in medical devices. The industry must be better prepared to protect itself and patients.By Mac McMillan CEO, CynergisTek, 9/29/20142 comments | Read | Post a Comment
InformationWeek Must Reads Oct. 21, 2014InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.
Security Job #1 For FedsThe 2014 InformationWeek Government IT Priorities Survey shows federal IT pros care about security - itís rated as very important by 69% of respondents, 30 percentage points ahead of the No. 2 priority, disaster recovery. Will the upcoming NIST cyber-security framework help manage risk?
IT Salary Survey 2014: GovernmentFederal government IT professionals saw modest bumps in compensation. But that doesn't mean all is well: 29% of staffers had fewer training opportunities, and 21% of managers had their benefits cut. Half are looking for new jobs.