Government // Cybersecurity
News & Commentary
Ashley Madison Fallout: Investigations, Lawsuits, Lessons
Larry Loeb, Blogger, Informationweek
Commentary
The fallout from the Ashley Madison breach continues, offering some surprise lessons for CIOs and IT professionals on how to respond to a very public event.
By Larry Loeb Blogger, Informationweek, 8/26/2015
Comment6 comments  |  Read  |  Post a Comment
Electronic Warrantless Surveillance: What IT Should Know
Pablo Valerio, International Business & IT Consultant
Commentary
Today, in the name of public safety, federal and local government agencies are piling up advanced technologies to monitor people, with little regard for the basic principles of privacy. Here's what businesses and individuals need to know.
By Pablo Valerio International Business & IT Consultant, 8/26/2015
Comment7 comments  |  Read  |  Post a Comment
Ruling: FTC Can Hold Wyndham Liable For Data Breach
Dark Reading Staff,
News
Appeals Court ruling solidifies Federal Trade Commission's authority to take action against companies whose data breaches expose customer information.
By Dark Reading Staff , 8/24/2015
Comment3 comments  |  Read  |  Post a Comment
Ashley Madison Breach Should Spark Security Conversation
Larry Loeb, Blogger, Informationweek
Commentary
As people sift through the Ashley Madison data dump, this massive breach should spark a conversation among IT and security professionals, especially ones who work in the government and cyber-security fields.
By Larry Loeb Blogger, Informationweek, 8/22/2015
Comment12 comments  |  Read  |  Post a Comment
NASA Tells Us Not To Panic Over Asteroids
Nathan Eddy, Freelance Writer
Commentary
NASA continues its public service of reminding us all not to panic over misleading reports of our impending doom.
By Nathan Eddy Freelance Writer, 8/21/2015
Comment26 comments  |  Read  |  Post a Comment
Autonomous Cars In, Big Data Out In Gartner Hype Cycle
Larry Loeb, Blogger, Informationweek
Commentary
Gartner's annual Hype Cycle is out, and IoT and autonomous cars are in this year. Big data, however, is losing some of its luster.
By Larry Loeb Blogger, Informationweek, 8/19/2015
Comment11 comments  |  Read  |  Post a Comment
Google's Atlas Robot Takes A Walk In The Woods
Nathan Eddy, Freelance Writer
News
Designed to rescue humans trapped in dangerous terrain, the Atlas robot looks like a punch-drunk Terminator on the loose. It's the latest from Google and its Boston Dynamics firm.
By Nathan Eddy Freelance Writer, 8/18/2015
Comment2 comments  |  Read  |  Post a Comment
7 Hot Advances In Email Security
Andrew Froehlich, President & Lead Network Architect, West Gate Networks
News
Despite gaping security holes, email is too entrenched in business communications to go away. Consider these 7 ways to bolster email security and help IT admins sleep easier at night.
By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 8/18/2015
Comment4 comments  |  Read  |  Post a Comment
Why AT&T's 'Willingness' To Help NSA Is Alarming
Eric Zeman,
News
Snowden documents show AT&T was all too happy to aid the NSA spy on Americans. Are we really that surprised?
By Eric Zeman , 8/17/2015
Comment18 comments  |  Read  |  Post a Comment
Keyless Security Not So Secure
Thomas Claburn, Editor at Large, Enterprise Mobility
News
A suppressed security paper shines a light on the shortcomings of the cryptography used to protect keyless vehicle access systems.
By Thomas Claburn Editor at Large, Enterprise Mobility, 8/14/2015
Comment4 comments  |  Read  |  Post a Comment
7 Worst Cloud Compliance Nightmares
Andrew Froehlich, President & Lead Network Architect, West Gate Networks
News
Compliance is difficult in any situation, and cloud computing makes it even more complicated. Check out these worst-case compliance scenarios and how to avoid them.
By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 8/12/2015
Comment0 comments  |  Read  |  Post a Comment
IBM, DOE Working Toward Data-Centric Supercomputing
William Terdoslavich, Freelance Writer
News
IBM and the US Energy Department are working toward creating the next-generation of high-performance computing systems, which they call "data-centric supercomputing." This has business and national security implementations.
By William Terdoslavich Freelance Writer, 8/7/2015
Comment1 Comment  |  Read  |  Post a Comment
Can't Touch This: 'Hammertoss' Russian Cyberspies Hide In Plain Sight
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
APT29 cyber espionage attackers operate under the cover of legitimate services including Twitter, Github, and cloud storage services.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/29/2015
Comment4 comments  |  Read  |  Post a Comment
Online Security: How The Experts Keep Safe
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Google researchers have compared the security practices of experts to non-experts, and identified several ways that typical Internet users can improve their online security.
By Thomas Claburn Editor at Large, Enterprise Mobility, 7/27/2015
Comment6 comments  |  Read  |  Post a Comment
Car Hacking Shifts Into High Gear
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Researchers now have proven you can hack a car remotely, and at Black Hat USA will share most -- but not all -- of the details on how they did it.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/23/2015
Comment11 comments  |  Read  |  Post a Comment
Twitter Security Pro: Encryption Isn't Enough
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Companies need to focus on developing secure coding practices and security education.
By Thomas Claburn Editor at Large, Enterprise Mobility, 7/23/2015
Comment2 comments  |  Read  |  Post a Comment
CISOs Caught In A Catch-22
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Chief information security officers are considered 'accountable' for breaches while not always in charge of all infosec strategy and purchases, new report shows.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/21/2015
Comment1 Comment  |  Read  |  Post a Comment
Google Fights Export Controls For 'Intrusion Software'
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Proposed export rules could hobble cybersecurity research, Google claims.
By Thomas Claburn Editor at Large, Enterprise Mobility, 7/21/2015
Comment2 comments  |  Read  |  Post a Comment
Notorious Cybercrime Underground Forum Infiltrated By FBI And Shut Down
Dark Reading Staff,
News
International law enforcement operation shutters Darkode underground cybercrime forum, leads to charges, arrests, searches of 70 members worldwide.
By Dark Reading Staff , 7/15/2015
Comment0 comments  |  Read  |  Post a Comment
14 Security Fails That Cost Executives Their Jobs
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Katherine Archuleta, the director of the Office of Personnel Management, is the latest casualty of a data breach, but she's certainly not the only one. There's no job security when your job is security.
By Thomas Claburn Editor at Large, Enterprise Mobility, 7/14/2015
Comment2 comments  |  Read  |  Post a Comment
More Stories
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest August 03, 2015
The networking industry agrees that software-defined networking is the way of the future. So where are all the deployments? We take a look at where SDN is being deployed and what's getting in the way of deployments.
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Flash Poll
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
UBM's Future Cities
Latest Stories from UBM's Future Cities
View All from Future Cities