Government // Cybersecurity
News & Commentary
Coordinated Attacks Call For More Sophisticated Cyber Defense
Henry Kenyon,
News
Agencies and industry are rethinking how they defend against coordinated attacks by teams of specialized hackers.
By Henry Kenyon , 9/29/2014
Comment0 comments  |  Read  |  Post a Comment
FDA Pushes To Improve Medical Device Security
Jai Vijayan, Freelance writer
News
Cyber attacks pose a grave threat to the integrity of healthcare services, agency says.
By Jai Vijayan Freelance writer, 9/29/2014
Comment1 Comment  |  Read  |  Post a Comment
DoE Preps Privacy Standards For Smart Grid
Jai Vijayan, Freelance writer
News
Department of Energy has released a set of voluntary privacy recommendations for smart grid owners, operators, and third parties; industry stakeholders have until October 14 to comment on draft.
By Jai Vijayan Freelance writer, 9/29/2014
Comment1 Comment  |  Read  |  Post a Comment
Shellshock's Threat To Healthcare
Mac McMillan, CEO, CynergisTek
Commentary
The Bash bug is everywhere, including in medical devices. The industry must be better prepared to protect itself and patients.
By Mac McMillan CEO, CynergisTek, 9/29/2014
Comment2 comments  |  Read  |  Post a Comment
Shellshock Bug: 6 Key Facts
Thomas Claburn, Editor-at-Large
News
The Shellshock bug could do more damage than the recent Heartbleed bug. Here's what you need to know.
By Thomas Claburn Editor-at-Large, 9/27/2014
Comment7 comments  |  Read  |  Post a Comment
Internet Of Things Intrigues Intelligence Community
Patience Wait,
News
IoT presents big opportunity for intelligence agencies, along with information overload and privacy risks.
By Patience Wait , 9/24/2014
Comment2 comments  |  Read  |  Post a Comment
Backlash Coming On Car-to-Car Talk?
Junko Yoshida,
News
Vehicle-to-vehicle communication technology is gaining momentum, and it could become a mandate. But industry and government must address privacy and other concerns.
By Junko Yoshida , 9/19/2014
Comment1 Comment  |  Read  |  Post a Comment
Federal Inaction Breeds ID Theft, Says Frank Abagnale
David F Carr, Editor, InformationWeek Government/Healthcare
News
Onetime "Catch Me If You Can" swindler turned anti-fraud consultant says identity theft is "4,000 times easier" than when he was living a life of crime.
By David F Carr Editor, InformationWeek Government/Healthcare, 9/18/2014
Comment1 Comment  |  Read  |  Post a Comment
FCC In-Flight Cellphone Ban: Fight's On
Ellis Booker, Technology Journalist
News
Lobbyists and legislators urge the FCC not to reverse its 23-year-old ban on using cellphones during airline flight.
By Ellis Booker Technology Journalist, 9/17/2014
Comment5 comments  |  Read  |  Post a Comment
Open Source Fix For US Voting System?
David F Carr, Editor, InformationWeek Government/Healthcare
Commentary
Open source programmers and maverick election officials want to improve the way we vote, register to vote, and count the votes. Wish them luck.
By David F Carr Editor, InformationWeek Government/Healthcare, 9/16/2014
Comment4 comments  |  Read  |  Post a Comment
The Security Skills Shortage No One Talks About
Jeremy Bergsman & Emma Kinnucan, CEB
Commentary
Lack of soft skills in information security is an even bigger problem than the shortage of technical expertise.
By Jeremy Bergsman & Emma Kinnucan CEB, 9/16/2014
Comment13 comments  |  Read  |  Post a Comment
Dyre Straits: Why This Cloud Attack's Different
Kaushik Narayan, Co-Founder and CTO at Skyhigh Networks
Commentary
Dyre is a new breed of Trojan, attacking cloud apps and using the cloud as a delivery vehicle.
By Kaushik Narayan Co-Founder and CTO at Skyhigh Networks, 9/12/2014
Comment4 comments  |  Read  |  Post a Comment
Feds Hesitate Moving IT Services To The Cloud
Elena Malykhina, Technology Journalist
News
Government IT execs compare transitioning data to the cloud to giving their kids the keys to a new convertible.
By Elena Malykhina Technology Journalist, 9/11/2014
Comment2 comments  |  Read  |  Post a Comment
Apple iCloud Hack's Other Victim: Cloud Trust
Charles Babcock, Editor At Large, InformationWeek
Commentary
Our flash poll finds users feel more vulnerable about cloud security in general. No wonder: Apple's opening statement of indignation now sounds a little hollow.
By Charles Babcock Editor At Large, InformationWeek , 9/10/2014
Comment2 comments  |  Read  |  Post a Comment
Blinders For Google Glass
Thomas Claburn, Editor-at-Large
News
Cyborg Unplug promises to boot Google Glass and other surveillance devices from local networks.
By Thomas Claburn Editor-at-Large, 9/9/2014
Comment6 comments  |  Read  |  Post a Comment
Cross-Border Digital Searches: An Innovation-Friendly Approach
Daniel Castro, Senior Analyst, Information Technology and Innovation Foundation
Commentary
Case between the US government and Microsoft reveals the shortcomings of current laws.
By Daniel Castro Senior Analyst, Information Technology and Innovation Foundation, 9/5/2014
Comment1 Comment  |  Read  |  Post a Comment
Cyber Security Education: Remove The Limits
W. Hord Tipton,
Commentary
Highly technical and high-level strategic education must come together to achieve cyber security goals.
By W. Hord Tipton , 9/4/2014
Comment6 comments  |  Read  |  Post a Comment
Secure The Core: Advice For Agencies Under Attack
Vijay Basani, CEO, EiQ Networks
Commentary
When facing state-sponsored attacks, perimeter security is never enough.
By Vijay Basani CEO, EiQ Networks, 9/3/2014
Comment2 comments  |  Read  |  Post a Comment
Wanted By DHS: Breakout Ideas On Domestic Cybersecurity
William Welsh, Contributing Writer
News
Department of Homeland Security plans to fund cyber defense research efforts to develop pragmatic tools that can be deployed quickly, says Forrester.
By William Welsh Contributing Writer, 9/2/2014
Comment1 Comment  |  Read  |  Post a Comment
NIST Drafts Mobile App Security Guidelines
Richard W. Walker,
News
National Institute for Standards and Technology issues first draft of guidelines intended to help federal agencies balance benefits and risks of third-party mobile apps.
By Richard W. Walker , 8/28/2014
Comment5 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest September 24, 2014
Start improving branch office support by tapping public and private cloud resources to boost performance, increase worker productivity, and cut costs.
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Flash Poll
Steal Our Slides
IT Salary Survey 2014: Government
IT Salary Survey 2014: Government
Federal government IT professionals saw modest bumps in compensation. But that doesn't mean all is well: 29% of staffers had fewer training opportunities, and 21% of managers had their benefits cut. Half are looking for new jobs.
Slideshows
Twitter Feed
InformationWeek Radio
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.