As former Secretary of State Hillary Clinton becomes ever more embattled in the press and in politics because of her personal email usage, we can draw lessons for enterprises and employees alike on contending with Shadow IT.By Joe Stanganelli Attorney, Beacon Hill Law, 3/23/20154 comments | Read | Post a Comment
Chief privacy officer Jason Straight shares his insights on why organizations are struggling to stop the breach wave -- and manage the aftermath.By Kelly Jackson Higgins Executive Editor at Dark Reading, 3/18/20157 comments | Read | Post a Comment
Hillary Clinton isn't the first politician to have committed a data compliance faux pas when it comes to email. CIOs, compliance departments, and privacy officers would do well to learn from the mistakes of those who screwed up before her.By Joe Stanganelli Attorney, Beacon Hill Law, 3/17/201517 comments | Read | Post a Comment
ICYMI: Check out Dark Reading Radio's recent broadcast and discussion about the pitfalls of new government efforts to fight bad hackers that could ultimately hurt the good guys.By Kelly Jackson Higgins Executive Editor at Dark Reading, 3/16/20153 comments | Read | Post a Comment
ISPs and others are unofficially sounding the alarm in the event that a US government agency is seeking access to user records. Here's why this matters to IT.By Joe Stanganelli Attorney, Beacon Hill Law, 3/4/20151 Comment | Read | Post a Comment
Many countries are creating policies to restrict the flow of data, driven by privacy or protectionist concerns. Such limits could stifle economic growth.By Michael I. Roth Chairman and CEO of The Interpublic Group of Companies, Inc. and Chair of the Business Roundtable Global IT Subcommittee., 3/3/20152 comments | Read | Post a Comment
Europol leads the effort to bring down the bank credential-stealing botnet that infected 3.2 million computers across the globe.By Sara Peters Senior Editor at Dark Reading, 2/25/20150 comments | Read | Post a Comment
But the 'sophisticated' attacks hit only Gemalto office networks--not 'massive theft' of SIM crypto keys, vendor says, and such an attack, if waged, would only affect 2G networks, not 3G or 4G.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/25/20153 comments | Read | Post a Comment
Vladimir Drinkman, cohort of Albert Gonzalez, appears before US federal court after arrest and extradition by Dutch authorities.By Sara Peters Senior Editor at Dark Reading, 2/18/20152 comments | Read | Post a Comment
So, you don't work for a financial institution? Don't think you're off the hook for the kind of theft discussed by Kaspersky. Banks are certainly not the only organizations moving around massive amounts of money every day.By Susan Nunziata Editorial Director, 2/18/201527 comments | Read | Post a Comment
The Obama White House wants more effective sharing of cyber security data between the public and private sectors. Despite some snubs, Apple's Tim Cook spoke at a special summit on the issue.By Thomas Claburn Editor at Large, Enterprise Mobility, 2/14/20156 comments | Read | Post a Comment
A US senator's report finds that carmakers are leaving vehicles open to intrusive attacks that can steal personal data and take over controls. By Eric Zeman , 2/9/201510 comments | Read | Post a Comment
In the wake of the Sony breach, spy agency's Information Assurance Directorate (IAD) arm provides best practices to mitigate damage of data annihilation attacks.By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/22/20153 comments | Read | Post a Comment
Security Job #1 For FedsThe 2014 InformationWeek Government IT Priorities Survey shows federal IT pros care about security - it’s rated as very important by 69% of respondents, 30 percentage points ahead of the No. 2 priority, disaster recovery. Will the upcoming NIST cyber-security framework help manage risk?
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.