Government // Cybersecurity
News & Commentary
NSA Report: How To Defend Against Destructive Malware
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
In the wake of the Sony breach, spy agency's Information Assurance Directorate (IAD) arm provides best practices to mitigate damage of data annihilation attacks.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/22/2015
Comment3 comments  |  Read  |  Post a Comment
Enterprise Drones: What CIOs Should Know
Curtis Franklin Jr.,
Commentary
Flying drones are coming to the enterprise: Will CIOs and the FAA be ready?
By Curtis Franklin Jr. , 1/16/2015
Comment16 comments  |  Read  |  Post a Comment
In Wake Of Violence, France Reports Spike In Cyberattacks
Sara Peters, Senior Editor at Dark Reading
News
19,000 French websites have been attacked since Jan. 7.
By Sara Peters Senior Editor at Dark Reading, 1/15/2015
Comment8 comments  |  Read  |  Post a Comment
Obama Calls For 30-Day Breach Notification Policy For Hacked Companies
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
But chances of this becoming a mandatory national breach notification law are no sure thing, even in the wake of the past year's high-profile hacks, experts say.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/12/2015
Comment12 comments  |  Read  |  Post a Comment
InformationWeek 2014 Strategic Security Survey
InformationWeek Staff,
News
Managing the complexity of security is the top concern for enterprise IT teams. Look for a new era of more sophisticated data analysis in the coming year.
By InformationWeek Staff , 1/9/2015
Comment1 Comment  |  Read  |  Post a Comment
FBI Director Says 'Sloppy' North Korean Hackers Gave Themselves Away
Sara Peters, Senior Editor at Dark Reading
News
Bureau chief says hackers occasionally forgot to use proxy servers, while the Director of National Intelligence says North Koreans have no sense of humor.
By Sara Peters Senior Editor at Dark Reading, 1/7/2015
Comment17 comments  |  Read  |  Post a Comment
Privacy By Design: Protect User Data From 'Get-Go'
Henry Kenyon,
News
International effort seeks to bake in consumer privacy options.
By Henry Kenyon , 1/5/2015
Comment0 comments  |  Read  |  Post a Comment
Sony Hacked By N. Korea, Hacktivists, Ex-Employee, Or All Of The Above?
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
FBI gets briefed on ex-Sony employee's possible role in hack as questions remain about who did what and when in epic breach of the entertainment company.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/30/2014
Comment21 comments  |  Read  |  Post a Comment
Sony Cancels Movie, US Confirms North Korea Involvement, But Were Bomb Threats Empty?
Sara Peters, Senior Editor at Dark Reading
News
After the Sony hackers issue threats of physical violence and 9/11-style attacks, The Interview is being killed before it even premieres. But would the attackers have really blown up theaters?
By Sara Peters Senior Editor at Dark Reading, 12/17/2014
Comment8 comments  |  Read  |  Post a Comment
Government IT In 2014: GAO's Critique
William Welsh, Contributing Writer
News
From cloud computing to data center consolidation, software licensing to data transparency, the GAO was watching.
By William Welsh Contributing Writer, 12/15/2014
Comment1 Comment  |  Read  |  Post a Comment
Iowa Mobile ID Program Raises Privacy Questions
Eric Zeman,
News
The state of Iowa proposes using a mobile app as an option to a traditional driver's license -- but security questions abound.
By Eric Zeman , 12/12/2014
Comment4 comments  |  Read  |  Post a Comment
InformationWeek 2014 Mobile Security Survey
InformationWeek Staff,
News
Securing company data on mobile devices is the top concern when it comes to mobile security. Respondents worry most about data loss due to lost or stolen devices, and less than half of respondents feel confident that data is protected.
By InformationWeek Staff , 12/12/2014
Comment0 comments  |  Read  |  Post a Comment
FBI Calls For Law Facilitating Security Information Sharing
Sara Peters, Senior Editor at Dark Reading
News
Uniform breach notification laws and amendments to the Computer Fraud and Abuse Act are also on the list.
By Sara Peters Senior Editor at Dark Reading, 12/11/2014
Comment2 comments  |  Read  |  Post a Comment
4 Worst Government Data Breaches Of 2014
Jai Vijayan, Freelance writer
News
Government agency breaches pale in comparison to private sector companies' problems, but government did get hacked in 2014. Look at the four biggest incidents.
By Jai Vijayan Freelance writer, 12/11/2014
Comment0 comments  |  Read  |  Post a Comment
Security Armchair Quarterbacks: Go Away
Jonathan Feldman, CIO, City of Asheville, NC
Commentary
Cyber criminals will never go away. Instead of looking for a silver bullet, be proactive, interactive, and focus on reducing risk.
By Jonathan Feldman CIO, City of Asheville, NC, 12/9/2014
Comment3 comments  |  Read  |  Post a Comment
Blackphone Adds Secure App Store
Eric Zeman,
News
Update to PrivatOS adds a dedicated storefront and segregated work spaces.
By Eric Zeman , 12/9/2014
Comment0 comments  |  Read  |  Post a Comment
Senate Bill Prohibits Government-Mandated Backdoors
Thomas Claburn, Editor-at-Large
News
Bill represents a response to government officials who want a way to bypass encryption in technology products.
By Thomas Claburn Editor-at-Large, 12/5/2014
Comment10 comments  |  Read  |  Post a Comment
FCC: Too Many Phones Still Being Stolen
Eric Zeman,
News
FCC tasks carriers and law enforcement to do more to deter smartphone theft.
By Eric Zeman , 12/5/2014
Comment7 comments  |  Read  |  Post a Comment
Why FBI Is Wrong On Encryption Workaround
Daniel Castro, Senior Analyst, Information Technology and Innovation Foundation
Commentary
Such a measure would invade privacy, extend government overreach, and hurt US tech companies.
By Daniel Castro Senior Analyst, Information Technology and Innovation Foundation, 12/3/2014
Comment2 comments  |  Read  |  Post a Comment
Senate Explores Outsourcing Security Services
Jai Vijayan, Freelance writer
News
The US Senate might outsource core cyber security support to a managed security service. Candidate tasks include network security monitoring, threat analysis, incident reporting, vulnerability analysis, and security engineering and research.
By Jai Vijayan Freelance writer, 12/2/2014
Comment3 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest, Dec. 9, 2014
Apps will make or break the tablet as a work device, but don't shortchange critical factors related to hardware, security, peripherals, and integration.
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Flash Poll
Steal Our Slides
InformationWeek 2014 Backup Technologies Survey
InformationWeek 2014 Backup Technologies Survey
Backup may not get the attention other technologies get, but few are more important to your business' survival. IT pros' No. 1 challenge: high cost of backup systems and procedures.
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
InformationWeek Live For the Week of January 25, 2015
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
UBM's Future Cities
Latest Stories from UBM's Future Cities
View All from Future Cities