ISPs and others are unofficially sounding the alarm in the event that a US government agency is seeking access to user records. Here's why this matters to IT.By Joe Stanganelli Attorney, Beacon Hill Law, 3/4/20151 Comment | Read | Post a Comment
Many countries are creating policies to restrict the flow of data, driven by privacy or protectionist concerns. Such limits could stifle economic growth.By Michael I. Roth Chairman and CEO of The Interpublic Group of Companies, Inc. and Chair of the Business Roundtable Global IT Subcommittee., 3/3/20151 Comment | Read | Post a Comment
Europol leads the effort to bring down the bank credential-stealing botnet that infected 3.2 million computers across the globe.By Sara Peters Senior Editor at Dark Reading, 2/25/20150 comments | Read | Post a Comment
But the 'sophisticated' attacks hit only Gemalto office networks--not 'massive theft' of SIM crypto keys, vendor says, and such an attack, if waged, would only affect 2G networks, not 3G or 4G.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/25/20153 comments | Read | Post a Comment
Vladimir Drinkman, cohort of Albert Gonzalez, appears before US federal court after arrest and extradition by Dutch authorities.By Sara Peters Senior Editor at Dark Reading, 2/18/20152 comments | Read | Post a Comment
So, you don't work for a financial institution? Don't think you're off the hook for the kind of theft discussed by Kaspersky. Banks are certainly not the only organizations moving around massive amounts of money every day.By Susan Nunziata Editorial Director, 2/18/201527 comments | Read | Post a Comment
The Obama White House wants more effective sharing of cyber security data between the public and private sectors. Despite some snubs, Apple's Tim Cook spoke at a special summit on the issue.By Thomas Claburn Editor at Large, Enterprise Mobility, 2/14/20156 comments | Read | Post a Comment
A US senator's report finds that carmakers are leaving vehicles open to intrusive attacks that can steal personal data and take over controls. By Eric Zeman , 2/9/20159 comments | Read | Post a Comment
In the wake of the Sony breach, spy agency's Information Assurance Directorate (IAD) arm provides best practices to mitigate damage of data annihilation attacks.By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/22/20153 comments | Read | Post a Comment
But chances of this becoming a mandatory national breach notification law are no sure thing, even in the wake of the past year's high-profile hacks, experts say.By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/12/201512 comments | Read | Post a Comment
Managing the complexity of security is the top concern for enterprise IT teams. Look for a new era of more sophisticated data analysis in the coming year.By InformationWeek Staff , 1/9/20151 Comment | Read | Post a Comment
Bureau chief says hackers occasionally forgot to use proxy servers, while the Director of National Intelligence says North Koreans have no sense of humor. By Sara Peters Senior Editor at Dark Reading, 1/7/201517 comments | Read | Post a Comment
FBI gets briefed on ex-Sony employee's possible role in hack as questions remain about who did what and when in epic breach of the entertainment company.By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/30/201421 comments | Read | Post a Comment
After the Sony hackers issue threats of physical violence and 9/11-style attacks, The Interview is being killed before it even premieres. But would the attackers have really blown up theaters?By Sara Peters Senior Editor at Dark Reading, 12/17/20148 comments | Read | Post a Comment
Security Job #1 For FedsThe 2014 InformationWeek Government IT Priorities Survey shows federal IT pros care about security - it’s rated as very important by 69% of respondents, 30 percentage points ahead of the No. 2 priority, disaster recovery. Will the upcoming NIST cyber-security framework help manage risk?
InformationWeek 2014 Hybrid Cloud SurveyMixing public and private can deliver the best of both cloud worlds for IT groups that can figure out where workloads work best and address potential security issues.