IoT
Government // Cybersecurity
News & Commentary
Where 2016 US Presidential Contenders Stand On Tech Issues
Michelle Maisto, Freelance Writer
News
From fighting terror with tech to backing net neutrality to worrying about AI, here's a look at what some of the 2016 US Presidential hopefuls have on their tech agendas.
By Michelle Maisto Freelance Writer, 2/14/2016
Comment0 comments  |  Read  |  Post a Comment
Google Gives Away 2GB Of Storage To Promote Security
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Google does its part for Safer Internet Day with its giveaway. Also, Gmail users will start seeing warnings when message senders can't be authenticated and when they don't support transport encryption.
By Thomas Claburn Editor at Large, Enterprise Mobility, 2/11/2016
Comment5 comments  |  Read  |  Post a Comment
Chinese Cyberspies Pivot To Russia In Wake Of Obama-Xi Pact
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Kaspersky Lab has identified a massive uptick in cyber espionage in Russia by 'Chinese-speaking' APTs.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/9/2016
Comment0 comments  |  Read  |  Post a Comment
Facebook Faces Trouble In France For Tracking Non-Users
Nathan Eddy, Freelance Writer
News
The CNIL, France's data regulation authority, has issued a formal notice to Facebook, warning the social network that it needs to fairly collect data concerning the browsing activity of Internet users who do not have an account.
By Nathan Eddy Freelance Writer, 2/9/2016
Comment0 comments  |  Read  |  Post a Comment
BIOS Hack Detection Added To Dell Enterprise Security Suite
Larry Loeb, Blogger, Informationweek
News
With millions of machines potentially vulnerable to attacks on their BIOS firmware, Dell has introduced a verification tool designed for enterprise IT to monitor users' machines and intervene if an attack is detected. The cloud-based tool takes a different approach than other BIOS offerings on the market.
By Larry Loeb Blogger, Informationweek, 2/9/2016
Comment2 comments  |  Read  |  Post a Comment
US Education CIO Admits To 'Unacceptable' Behavior
Michelle Maisto, Freelance Writer
News
US Department of Education CIO Danny Harris was grilled by lawmakers about possible ethics violations.†Meanwhile the department, which has a lending budget the size of Citibank, was still said to be vulnerable to security threats.
By Michelle Maisto Freelance Writer, 2/8/2016
Comment1 Comment  |  Read  |  Post a Comment
Lights Out: Not So Fast
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Author and famed broadcast journalist Ted Koppel's new bestseller warns of a 'likely' nationwide and devastating blackout of the US grid at the hands of hackers, but some government and utility industry officials disagree.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/3/2016
Comment3 comments  |  Read  |  Post a Comment
Passwords, Email Addresses, Were Most Stolen Data In 2015
Dark Reading Staff,
News
Analysis of public data breaches finds US and UK represented more than 45% of all reported breaches last year, and major energy firms make the list of most multiple breaches.
By Dark Reading Staff , 2/3/2016
Comment1 Comment  |  Read  |  Post a Comment
NASA Denies Hackers Hijacked Its Drone
Thomas Claburn, Editor at Large, Enterprise Mobility
News
The space agency insists AnonSec didn't commandeer a NASA Global Hawk drone, but it's still looking into claims its network was hacked.
By Thomas Claburn Editor at Large, Enterprise Mobility, 2/2/2016
Comment2 comments  |  Read  |  Post a Comment
The Cybersecurity Talent You Seek May Be In-House
Rutrell Yasin, Business Technology Writer, Tech Writers Bureau
News
IT staff in many cases are already performing security-related work -- with proper training, they could be converted to the security team.
By Rutrell Yasin Business Technology Writer, Tech Writers Bureau, 2/1/2016
Comment1 Comment  |  Read  |  Post a Comment
How Incident Response Fails In Industrial Control System Networks
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Experts say a solid incident response plan is the best way to minimize the damage of a cyberattack--but IR isn't so simple for the ICS/SCADA world.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/28/2016
Comment9 comments  |  Read  |  Post a Comment
US Air Force Launches First Cyberspace Weapon System
Dawn Kawamoto, Freelance Writer and Editor
News
The US Air Force hit the "go" button on its first fully operational cyberspace weapon system, which acts as a massive firewall for its Air Force Information Network.
By Dawn Kawamoto Freelance Writer and Editor, 1/28/2016
Comment2 comments  |  Read  |  Post a Comment
OPM Breach Leads To New Systems, Procedures
Larry Loeb, Blogger, Informationweek
Commentary
The Obama Administration announced changes to the Office of Personnel Management designed to ameliorate the flawed systems and processes that led to a massive data breach in late 2014. The plans -- and the steps taken to get there -- hold lessons for any IT organization.
By Larry Loeb Blogger, Informationweek, 1/28/2016
Comment4 comments  |  Read  |  Post a Comment
NetFlow Or sFlow For Fastest DDoS Detection?
Vincent Berk,
Commentary
It's still not an easy choice, but combined with the faster NetFlow exporters that have recently come to market, the speed advantage of sFlow is starting to fade.
By Vincent Berk , 1/26/2016
Comment11 comments  |  Read  |  Post a Comment
65% Say Cloud As Secure As On-Premises
Charles Babcock, Editor at Large, Cloud
News
Nearly two-thirds of IT security professionals think cloud software security equals what they can provide in enterprise data centers, according to Cloud Security Alliance survey.
By Charles Babcock Editor at Large, Cloud, 1/25/2016
Comment6 comments  |  Read  |  Post a Comment
IoT Shows Its Worth To Businesses
Thomas Claburn, Editor at Large, Enterprise Mobility
News
The Internet of Things (IoT) can be used for a diverse set of tasks, including opening up new business models. A recent Forrester report explores how businesses are embracing IoT.
By Thomas Claburn Editor at Large, Enterprise Mobility, 1/23/2016
Comment4 comments  |  Read  |  Post a Comment
Measuring Real Risk: The Business View
Kelly Jackson Higgins, Executive Editor at Dark Reading
Commentary
Dark Reading's Jan. 26 virtual event on the business perspective of cybersecurity will feature a panel discussion on how to measure risk and the cost of a security program.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/22/2016
Comment2 comments  |  Read  |  Post a Comment
Encryption Vs. Privacy Battles Rage From Davos To US
Dawn Kawamoto, Freelance Writer and Editor
News
The debate over efforts to protect users' privacy and encryption versus governments' efforts to fight terrorism was a major focus at the World Economic Forum in Davos this week. Meanwhile, battles over the same issue are emerging in the US from New York to California on the legislative level.
By Dawn Kawamoto Freelance Writer and Editor, 1/22/2016
Comment0 comments  |  Read  |  Post a Comment
Former Director Of NSA And CIA Says US Cybersecurity Policy MIA
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Gen. Michael Hayden says US government doesn't have the 'framework' to handle attacks by nation-states, others against the power grid, data.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/13/2016
Comment2 comments  |  Read  |  Post a Comment
Project 'Gridstrike' Finds Substations To Hit For A US Power Grid Blackout
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Turns out free and publicly available information can be used to determine the most critical electric substations in the US, which if attacked, could result in a nationwide blackout.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/7/2016
Comment3 comments  |  Read  |  Post a Comment
More Stories
Register for InformationWeek Newsletters
White Papers
Current Issue
How to Knock Down Barriers to Effective Risk Management
Risk management today is a hodgepodge of systems, siloed approaches, and poor data collection practices. That isn't how it should be.
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Flash Poll
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.