Meanwhile, UL is also in discussion with the White House on its plans to foster standards for Internet of Things security.By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/6/20151 Comment | Read | Post a Comment
The Linux Foundation's Core Infrastructure Initiative has selected three security-oriented projects to receive a total of $500,000 in funding.By Charles Babcock Editor at Large, Cloud, 6/25/20152 comments | Read | Post a Comment
When artists and courts come together to keep kids out of prison, data privacy is a key concern. The Young New Yorkers group uses Wall Street tools to solve the problem.By Curtis Franklin Jr. Executive Editor, Technical Content, 6/25/201511 comments | Read | Post a Comment
Google and Apple have publicly challenged calls from law enforcement agencies to weaken encryption on consumer devices. In turn, iOS 9 and Android M will sport a string of new security and privacy features for users.By Pablo Valerio International Business & IT Consultant, 6/24/20155 comments | Read | Post a Comment
In the Electronic Frontier Foundation's fifth annual report, Apple gets high marks for protecting privacy, while WhatsApp and AT&T land at the bottom.By Nathan Eddy Freelance Writer, 6/18/20158 comments | Read | Post a Comment
While your enterprise may have a chief information security officer and a robust data governance department, CIOs and IT organizations are the ones on the front lines of protecting enterprise data. What lessons can we draw from the OPM breach?By Larry Loeb Blogger, Informationweek, 6/17/20155 comments | Read | Post a Comment
Duqu 2.0 nation-state attackers used pilfered Foxconn hardware driver certs to sign spying malware that hit negotiators in Iranian nuclear pact discussions, Kaspersky Lab -- and now, an ICS/SCADA hardware vendor.By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/15/20150 comments | Read | Post a Comment
Several key questions remain surrounding the nation-state attack targeting intel at Kaspersky Lab, international participants at the Iranian nuclear negotiations, and other organizations. By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/11/20152 comments | Read | Post a Comment
It's no longer acceptable for businesses to play the victim when cybercrime strikes. Companies of all sizes must take action.By Sean McGrath Freelance IT Writer, 6/11/20151 Comment | Read | Post a Comment
New nation-state campaign with previous ties to Stuxnet spies on security firm's research and anti-cyber spying technologies -- plus participants in Iranian nuclear negotiations and their telecommunications, mobile providers.By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/10/20151 Comment | Read | Post a Comment
Just 31% of federal agencies today host HTTPS websites and the Office of Management and Budget (OMB) has now given the rest of the government a deadline for doing so.By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/9/20151 Comment | Read | Post a Comment
Flaws in Googleís Android operating system mean the factory-reset option is unlikely to permanently wipe all your data -- or master token -- from the device.By Nathan Eddy Freelance Writer, 5/25/20153 comments | Read | Post a Comment
NASA's Technology Roadmap for 2015-2035 gives hints about the future of IT in your enterprise. Here's how space is changing big data, supercomputing, and other technologies.By David Wagner Executive Editor, Community & IT Life, 5/21/201516 comments | Read | Post a Comment
The NSA and its Five Eyes allies researched a man-in-the-middle attack to infect Android smartphone users by hacking Google's App Store. It's the last revelation from Edward Snowden. By Eric Zeman , 5/21/201520 comments | Read | Post a Comment
There are conflicting reports over whether security researcher Chris Roberts hacked into flight controls and manipulated a plane.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/20/201511 comments | Read | Post a Comment
The letter, signed by Google, Apple, and a number of tech companies and security organizations, is urging Obama to halt legislation that would allow government to access personal data stored on mobile devices.By Nathan Eddy Freelance Writer, 5/19/20151 Comment | Read | Post a Comment
Whether prominent hacker Chris Roberts took over a plane or not, the industry needs to rethink the way white hat hackers do their research.By David Wagner Executive Editor, Community & IT Life, 5/18/20155 comments | Read | Post a Comment
Security Job #1 For FedsThe 2014 InformationWeek Government IT Priorities Survey shows federal IT pros care about security - itís rated as very important by 69% of respondents, 30 percentage points ahead of the No. 2 priority, disaster recovery. Will the upcoming NIST cyber-security framework help manage risk?
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.