Government // Cybersecurity
News & Commentary
'Windows To Go' Device Wins Federal Cryptographic Certification
David F Carr, Editor, InformationWeek Healthcare
News
With FIPS 140-2 Level 3 certification, the Imation IronKey portable USB-based workspace becomes a mobility option for both civilian and military agencies.
By David F Carr Editor, InformationWeek Healthcare, 7/10/2014
Comment0 comments  |  Read  |  Post a Comment
Controversial Cyber Security Bill Advances
Thomas Claburn, Editor-at-Large
News
Senate bill aims to promote information sharing to combat cyberthreats, but critics contend it lacks privacy protections.
By Thomas Claburn Editor-at-Large, 7/9/2014
Comment7 comments  |  Read  |  Post a Comment
Electronic Frontier Foundation Sues NSA, Director of National Intelligence
Sara Peters,
News
EFF says that the agencies have failed to provide documents requested under the Freedom of Information Act.
By Sara Peters , 7/8/2014
Comment2 comments  |  Read  |  Post a Comment
HIPAA Complaints Vex Healthcare Organizations
Alison Diana, Senior Editor
News
Since 2013, complaints to the Department of Health and Human Services have risen regarding Health Insurance Portability and Accountability Act violations.
By Alison Diana Senior Editor, 7/8/2014
Comment0 comments  |  Read  |  Post a Comment
Florida Law Aims To Tighten Data Security
Alison Diana, Senior Editor
News
Florida's new data privacy law increases security accountability for all enterprises; healthcare providers could face greater burden to protect patients' personal information.
By Alison Diana Senior Editor, 7/7/2014
Comment10 comments  |  Read  |  Post a Comment
Facebook Mood Experiment Draws FTC Complaint
Kristin Burnham, Senior Editor, InformationWeek.com
News
Electronic Privacy Information Center files a complaint against Facebook alleging that its news feed experiment deceived users and violated a 2012 Consent Order.
By Kristin Burnham Senior Editor, InformationWeek.com, 7/7/2014
Comment7 comments  |  Read  |  Post a Comment
TSA Requires Charged Devices At Some Overseas Airports
Eric Zeman,
News
Homeland Security tells US-bound air travelers at certain overseas airports that mobile devices need to be operational when boarding, or gadgets will be confiscated.
By Eric Zeman , 7/7/2014
Comment7 comments  |  Read  |  Post a Comment
Google Users Change Search Habits After Snowden
Joe Stanganelli, Attorney, Beacon Hill Law
News
Researchers find significant decrease in "embarrassing" and "private" terms in Google searches after NSA surveillance revelations.
By Joe Stanganelli Attorney, Beacon Hill Law, 7/3/2014
Comment4 comments  |  Read  |  Post a Comment
CosmicDuke: Cosmu & MiniDuke Mash-Up
Sara Peters,
News
F-Secure believes that the combo malware might have connections to the perpetrators of the miniDuke attacks.
By Sara Peters , 7/2/2014
Comment1 Comment  |  Read  |  Post a Comment
Virtual Currencies Draw Fresh Regulator Scrutiny
William Jackson, Technology Writer
News
Federal regulators are paying more attention to the growing use of bitcoin and other virtual online currencies. The GAO calls for more consumer protections.
By William Jackson Technology Writer, 7/2/2014
Comment1 Comment  |  Read  |  Post a Comment
BlackBerry Swipes At Android Security
Eric Zeman,
News
In response to Google I/O announcements, BlackBerry criticizes Android's lack of security. On point, or sour grapes?
By Eric Zeman , 6/28/2014
Comment10 comments  |  Read  |  Post a Comment
Alexander: Cyber Security Pros Face Uphill Battle
Tim Wilson, Editor in Chief, Dark Reading
News
Former NSA chief says rapid growth of data, malware will challenge security teams in coming years.
By Tim Wilson Editor in Chief, Dark Reading, 6/26/2014
Comment1 Comment  |  Read  |  Post a Comment
Montana Health Department Hacked
Alison Diana, Senior Editor
News
State of Montana notifies 1.3 million patients of breach to Department of Public Health and Human Services server.
By Alison Diana Senior Editor, 6/25/2014
Comment12 comments  |  Read  |  Post a Comment
Sensitive Data Protection Bedevils IT Security Pros
William Welsh, Contributing Writer
News
Most organizations don't know where their sensitive structured or unstructured data resides, says new Ponemon study.
By William Welsh Contributing Writer, 6/24/2014
Comment3 comments  |  Read  |  Post a Comment
Dark Reading Radio: RAT Exterminators
Sara Peters,
Commentary
Join us Wednesday, June 25, at 1:00 p.m. ET for a conversation with Adam Meyers, director of intelligence for CrowdStrike.
By Sara Peters , 6/24/2014
Comment4 comments  |  Read  |  Post a Comment
Phishing Scam Targeted 75 US Airports
William Welsh, Contributing Writer
News
Major cyberattack carried out in 2013 by an undisclosed nation-state sought to breach US commercial aviation networks, says Center for Internet Security report.
By William Welsh Contributing Writer, 6/23/2014
Comment0 comments  |  Read  |  Post a Comment
SMBs Ignoring Insider Threats
Henry Kenyon,
News
Many smaller organizations do not adequately protect against insider threats, CERT expert warns.
By Henry Kenyon , 6/23/2014
Comment7 comments  |  Read  |  Post a Comment
White House Maker Faire: 10 Cool Inventions
Elena Malykhina, Technology Journalist
News
More than 100 exhibitors of all ages gathered at the White House to show off their inventions. Check out some of the intriguing innovations.
By Elena Malykhina Technology Journalist, 6/21/2014
Comment1 Comment  |  Read  |  Post a Comment
Ending Cybersecurity Labor Shortage Will Take Time
Sara Peters,
News
Researchers at RAND say the industry has taken the right steps, but there is still a long way to go.
By Sara Peters , 6/18/2014
Comment3 comments  |  Read  |  Post a Comment
Cyber Attackers Target Small, Midsized Businesses
Henry Kenyon,
News
As large companies beef up security, attackers seek out weak links and use social tactics to hit smaller enterprises.
By Henry Kenyon , 6/18/2014
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - June 10, 2014
When selecting servers to support analytics, consider data center capacity, storage, and computational intensity.
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Flash Poll
Steal Our Slides
IT Salary Survey 2014: Banking
IT Salary Survey 2014: Banking
It's been a good year for banking and financial services IT pros: Most are satisfied with their job responsibilities, compensation, and job security. Few are looking for a new job, but active job searchers want higher pay.
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join InformationWeek’s Lorna Garey and Mike Healey, president of Yeoman Technology Group, an engineering and research firm focused on maximizing technology investments, to discuss the right way to go digital.
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.