Government // Cybersecurity
News & Commentary
US House Inspector General: IT Audit Activist
David F Carr, Editor, InformationWeek Healthcare
News
At the 2014 GRC Conference, House IG Theresa Grafenstine argues internal auditors must be more forward looking -- and explains why being exempt from regulations just makes her job harder.
By David F Carr Editor, InformationWeek Healthcare, 8/20/2014
Comment0 comments  |  Read  |  Post a Comment
4 Tips: Protect Government Data From Mobile Malware
Julie M. Anderson, Managing Director, Civitas Group
Commentary
Mobile malware continues to proliferate, particularly on Android devices. These four steps help counter the threat.
By Julie M. Anderson Managing Director, Civitas Group, 8/20/2014
Comment2 comments  |  Read  |  Post a Comment
Nuclear Regulatory Commission Compromised 3 Times In Past 3 Years
Sara Peters, Senior Editor at Dark Reading
News
Unnamed actors try to swipe privileged credentials.
By Sara Peters Senior Editor at Dark Reading, 8/19/2014
Comment3 comments  |  Read  |  Post a Comment
Cybersecurity: How Involved Should Boards Of Directors Be?
David F Carr, Editor, InformationWeek Healthcare
News
Security audit groups ISACA and IIA weigh in on what role the board of directors should play in an enterprise's cybersecurity strategies.
By David F Carr Editor, InformationWeek Healthcare, 8/19/2014
Comment7 comments  |  Read  |  Post a Comment
NSA Collected More Records Than Court Allowed
Sara Peters, Senior Editor at Dark Reading
News
New documents show the Foreign Intelligence Surveillance Court is stumped by the NSA's "systemic overcollection."
By Sara Peters Senior Editor at Dark Reading, 8/13/2014
Comment5 comments  |  Read  |  Post a Comment
Microsoft Delays ActiveX Blocking In IE
Michael Endler, Associate Editor, InformationWeek.com
News
In response to customer concerns, Microsoft won't start blocking ActiveX controls in IE until September.
By Michael Endler Associate Editor, InformationWeek.com, 8/13/2014
Comment2 comments  |  Read  |  Post a Comment
NASA Mission: Cloud Governance
Henry Kenyon,
News
Here's how the space agency's Jet Propulsion Laboratory addressed governance, risk, and compliance for its critical public cloud services.
By Henry Kenyon , 8/13/2014
Comment0 comments  |  Read  |  Post a Comment
UK Reconsidering Biometrics
Sara Peters, Senior Editor at Dark Reading
News
Parliament is looking for answers about biometrics' privacy, security, future uses, and whether or not legislation is ready for what comes next.
By Sara Peters Senior Editor at Dark Reading, 8/12/2014
Comment4 comments  |  Read  |  Post a Comment
California Nears Smartphone Kill Switch
Eric Zeman,
News
Law would force phone makers to add remote kill switches; Apple, Google, and Microsoft have already agreed to implement them.
By Eric Zeman , 8/12/2014
Comment13 comments  |  Read  |  Post a Comment
Cyber Risk Dashboards: False Sense Of Control?
(ISC)2 Writers Bureau,
Commentary
Federal programs promoting the use of risk dashboards can boost real-time visibility, but only if they are used correctly.
By (ISC)2 Writers Bureau , 8/12/2014
Comment2 comments  |  Read  |  Post a Comment
Google To Factor Security In Search Results
Thomas Claburn, Editor-at-Large
News
Websites that don't support HTTPS connections may soon be less prominent in Google search results.
By Thomas Claburn Editor-at-Large, 8/7/2014
Comment2 comments  |  Read  |  Post a Comment
5 Breakthrough DARPA Technologies Beyond GPS
Elena Malykhina, Technology Journalist
News
Miniaturization, pulsed lasers, and quantum physics will bring new capabilities for positioning, navigation, and timing (PNT) to the battlefield.
By Elena Malykhina Technology Journalist, 8/7/2014
Comment4 comments  |  Read  |  Post a Comment
Dan Geer Touts Liability Policies For Software Vulnerabilities
Sara Peters, Senior Editor at Dark Reading
News
Vendor beware. At Black Hat, Dan Geer suggests legislation to change product liability and abandonment rules for vulnerable and unsupported software.
By Sara Peters Senior Editor at Dark Reading, 8/6/2014
Comment6 comments  |  Read  |  Post a Comment
5 Steps To Supply Chain Security
Robert Lemos, Technology Journalist
News
The integrity of enterprise data is only as strong as your most vulnerable third-party supplier or business partner. It's time to shore up these connection points.
By Robert Lemos Technology Journalist, 8/6/2014
Comment5 comments  |  Read  |  Post a Comment
BlackBerry Comeback Far From Certain
Michael Endler, Associate Editor, InformationWeek.com
News
BlackBerry is finally ready to resume growth, says CEO Chen -- but first the company must overcome its crumbling device business.
By Michael Endler Associate Editor, InformationWeek.com, 8/5/2014
Comment22 comments  |  Read  |  Post a Comment
Microsoft Privacy Case: What's At Stake?
Michael Endler, Associate Editor, InformationWeek.com
News
A ruling that Microsoft must turn over emails in a foreign data center could cost US businesses billions and make a mess of international law, experts say.
By Michael Endler Associate Editor, InformationWeek.com, 8/2/2014
Comment13 comments  |  Read  |  Post a Comment
USB Hardware Easily Subverted, Researchers Claim
Thomas Claburn, Editor-at-Large
News
Security researchers say they can reprogram USB controller chips to hijack USB devices and connected computers.
By Thomas Claburn Editor-at-Large, 7/31/2014
Comment15 comments  |  Read  |  Post a Comment
How To Build A Federal Information Security Team
(ISC)2 Writers Bureau,
Commentary
Federal security officers face many challenges building and maintaining an information security team. Here are some tips for putting together a group of employees that will protect your systems and data.
By (ISC)2 Writers Bureau , 7/28/2014
Comment2 comments  |  Read  |  Post a Comment
Cyber Attacks Happen: Build Resilient Systems
Rutrell Yasin, Freelance Writer
News
You can't stop all attacks or build the perfect defense system. The higher-level objective is resilience.
By Rutrell Yasin , 7/25/2014
Comment9 comments  |  Read  |  Post a Comment
Travel Agency Fined £150,000 For Violating Data Protection Act
Sara Peters, Senior Editor at Dark Reading
News
That'll teach them not to retain credit card data in perpetuity.
By Sara Peters Senior Editor at Dark Reading, 7/24/2014
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - August 20, 2014
CIOs need people who know the ins and outs of cloud software stacks and security, and, most of all, can break through cultural resistance.
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Flash Poll
Steal Our Slides
IT Salary Survey 2014: BI/Analytics
IT Salary Survey 2014: BI/Analytics
Intelligence/analytics and data integration/warehousing professionals at the staff and managerial level are in demand, feel challenged, and are generally secure and optimistic about their careers. So why is compensation stagnant?
Slideshows
Twitter Feed
InformationWeek Radio
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.