Government // Cybersecurity
News & Commentary
Sony Cancels Movie, US Confirms North Korea Involvement, But Were Bomb Threats Empty?
Sara Peters, Senior Editor at Dark Reading
News
After the Sony hackers issue threats of physical violence and 9/11-style attacks, The Interview is being killed before it even premieres. But would the attackers have really blown up theaters?
By Sara Peters Senior Editor at Dark Reading, 12/17/2014
Comment1 Comment  |  Read  |  Post a Comment
Government IT In 2014: GAO's Critique
William Welsh, Contributing Writer
News
From cloud computing to data center consolidation, software licensing to data transparency, the GAO was watching.
By William Welsh Contributing Writer, 12/15/2014
Comment1 Comment  |  Read  |  Post a Comment
Iowa Mobile ID Program Raises Privacy Questions
Eric Zeman,
News
The state of Iowa proposes using a mobile app as an option to a traditional driver's license -- but security questions abound.
By Eric Zeman , 12/12/2014
Comment4 comments  |  Read  |  Post a Comment
InformationWeek 2014 Mobile Security Survey
InformationWeek Staff,
News
Securing company data on mobile devices is the top concern when it comes to mobile security. Respondents worry most about data loss due to lost or stolen devices, and less than half of respondents feel confident that data is protected.
By InformationWeek Staff , 12/12/2014
Comment0 comments  |  Read  |  Post a Comment
FBI Calls For Law Facilitating Security Information Sharing
Sara Peters, Senior Editor at Dark Reading
News
Uniform breach notification laws and amendments to the Computer Fraud and Abuse Act are also on the list.
By Sara Peters Senior Editor at Dark Reading, 12/11/2014
Comment2 comments  |  Read  |  Post a Comment
4 Worst Government Data Breaches Of 2014
Jai Vijayan, Freelance writer
News
Government agency breaches pale in comparison to private sector companies' problems, but government did get hacked in 2014. Look at the four biggest incidents.
By Jai Vijayan Freelance writer, 12/11/2014
Comment0 comments  |  Read  |  Post a Comment
Security Armchair Quarterbacks: Go Away
Jonathan Feldman, CIO, City of Asheville, NC
Commentary
Cyber criminals will never go away. Instead of looking for a silver bullet, be proactive, interactive, and focus on reducing risk.
By Jonathan Feldman CIO, City of Asheville, NC, 12/9/2014
Comment3 comments  |  Read  |  Post a Comment
Blackphone Adds Secure App Store
Eric Zeman,
News
Update to PrivatOS adds a dedicated storefront and segregated work spaces.
By Eric Zeman , 12/9/2014
Comment0 comments  |  Read  |  Post a Comment
Senate Bill Prohibits Government-Mandated Backdoors
Thomas Claburn, Editor-at-Large
News
Bill represents a response to government officials who want a way to bypass encryption in technology products.
By Thomas Claburn Editor-at-Large, 12/5/2014
Comment10 comments  |  Read  |  Post a Comment
FCC: Too Many Phones Still Being Stolen
Eric Zeman,
News
FCC tasks carriers and law enforcement to do more to deter smartphone theft.
By Eric Zeman , 12/5/2014
Comment7 comments  |  Read  |  Post a Comment
Why FBI Is Wrong On Encryption Workaround
Daniel Castro, Senior Analyst, Information Technology and Innovation Foundation
Commentary
Such a measure would invade privacy, extend government overreach, and hurt US tech companies.
By Daniel Castro Senior Analyst, Information Technology and Innovation Foundation, 12/3/2014
Comment2 comments  |  Read  |  Post a Comment
Senate Explores Outsourcing Security Services
Jai Vijayan, Freelance writer
News
The US Senate might outsource core cyber security support to a managed security service. Candidate tasks include network security monitoring, threat analysis, incident reporting, vulnerability analysis, and security engineering and research.
By Jai Vijayan Freelance writer, 12/2/2014
Comment3 comments  |  Read  |  Post a Comment
Microsoft Windows 8.1 Rises As Win XP Plummets
Michael Endler, Associate Editor, InformationWeek.com
News
After struggling for months to gain users, Windows 8 and 8.1 finally have eclipsed Windows XP in market share.
By Michael Endler Associate Editor, InformationWeek.com, 12/2/2014
Comment9 comments  |  Read  |  Post a Comment
FDA Scrutinizes Networked Medical Device Security
Philip Desjardins, Counsel, Arnold & Porter
Commentary
Federal agencies are trying to address threats to the privacy and security of people using connected medical devices.
By Philip Desjardins Counsel, Arnold & Porter, 12/1/2014
Comment0 comments  |  Read  |  Post a Comment
What Healthcare Can Learn From CHS Data Breach
Paula Knippa, Attorney
Commentary
Security breach that exposed personal data on 4.5 million Tennessee healthcare system patients offers key lessons to prevent similar cyber attacks.
By Paula Knippa Attorney, 11/25/2014
Comment9 comments  |  Read  |  Post a Comment
USPS Played Cat And Mouse With Cyber Attacker
Jai Vijayan, Freelance writer
News
Postal Service takes restrained, methodical approach to cyberattack. Was this the right strategy?
By Jai Vijayan Freelance writer, 11/24/2014
Comment4 comments  |  Read  |  Post a Comment
Ghostery Makes Privacy Marketable
Thomas Claburn, Editor-at-Large
News
Service that blocks Web tracking code turns out to be good for business, too.
By Thomas Claburn Editor-at-Large, 11/24/2014
Comment6 comments  |  Read  |  Post a Comment
Open Source Vs. Proprietary: Time For A New Manifesto
Kurt Marko, Contributing Editor
News
Philosophical debates over OpenStack vs. vCloud or OpenDaylight vs. Cisco ACI miss the point. For IT, ideological purity is neither possible nor desirable
By Kurt Marko Contributing Editor, 11/20/2014
Comment8 comments  |  Read  |  Post a Comment
7 Important Tech Regulatory Issues In 2015
Elena Malykhina, Technology Journalist
News
From net neutrality to patent reform and drones, these regulations will be in the spotlight. See what's at stake.
By Elena Malykhina Technology Journalist, 11/19/2014
Comment3 comments  |  Read  |  Post a Comment
TRUSTe Not So Trustworthy
Thomas Claburn, Editor-at-Large
News
Privacy certification company has agreed to pay $200,000 to settle FTC charges that it deceived consumers.
By Thomas Claburn Editor-at-Large, 11/17/2014
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest, Dec. 9, 2014
Apps will make or break the tablet as a work device, but don't shortchange critical factors related to hardware, security, peripherals, and integration.
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Flash Poll
Steal Our Slides
InformationWeek 2014 Mobile Security Survey
InformationWeek 2014 Mobile Security Survey
Securing company data on mobile devices is the top concern when it comes to mobile security. Respondents worry most about data loss due to lost or stolen devices, and less than half of respondents feel confident that data is protected.
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of December 7, 2014. Be here for the show and for the incredible Friday Afternoon Conversation that runs beside the program!
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
UBM's Future Cities
Latest Stories from UBM's Future Cities
View All from Future Cities