Government // Cybersecurity
News & Commentary
FBI Informant Sabu Tied To Foreign Attacks
Mathew J. Schwartz,
News
Report triggers questions about FBI's apparent use of a zero-day vulnerability, and whether campaign was designed to amass intelligence on foreign targets.
By Mathew J. Schwartz , 4/24/2014
Comment0 comments  |  Read  |  Post a Comment
DARPA Seeks Optical Devices To Boost Communications
Elena Malykhina, Technology Journalist
News
Direct On-chip Digital Optical Synthesizer program aims to shrink optical synthesizers for microchips that will enable advanced military operations such as detecting enemy chemical production sites.
By Elena Malykhina Technology Journalist, 4/23/2014
Comment0 comments  |  Read  |  Post a Comment
Cyber Espionage Incidents Triple: Verizon Report
William Jackson, Technology Writer
News
As cyber espionage grows quickly, government agencies become the No. 1 target, finds 2014 Data Breach Investigations Report.
By William Jackson Technology Writer, 4/22/2014
Comment4 comments  |  Read  |  Post a Comment
Sensitive Data: What Constitutes 'Reasonable Protection'?
Wyatt Kash, Editor, InformationWeek Government
Commentary
NIST's Cybersecurity Framework takes on new context for industry execs in light of FTC lawsuit against the Wyndham hotel chain over data security lapses.
By Wyatt Kash Editor, InformationWeek Government, 4/22/2014
Comment8 comments  |  Read  |  Post a Comment
Protecting Critical Infrastructure: A New Approach
William Jackson, Technology Writer
News
NIST's cyber-security framework gives critical-infrastructure operators a new tool to assess readiness. But will operators put this voluntary framework to work?
By William Jackson Technology Writer, 4/21/2014
Comment1 Comment  |  Read  |  Post a Comment
Cyber Security Insurance Market
William Jackson, Technology Writer
News
Cross-industry standards could spur more affordable cyber security insurance.
By William Jackson Technology Writer, 4/21/2014
Comment1 Comment  |  Read  |  Post a Comment
Mobile App Development: 5 Worst Security Dangers
Charlie Fairchild, Senior Android Developer, WillowTree Apps
Commentary
Address these areas when building apps -- or brace yourself for a PR and liability nightmare should an attacker find and exploit a flaw.
By Charlie Fairchild Senior Android Developer, WillowTree Apps, 4/18/2014
Comment1 Comment  |  Read  |  Post a Comment
Secure Collaboration Tool Aims to Stop Data Leaks
Henry Kenyon,
News
BAE Systems' leakage-prevention Secure Information Broker Appliance program edits info your organization doesn't want outsiders to see.
By Henry Kenyon , 4/18/2014
Comment1 Comment  |  Read  |  Post a Comment
License Plate Recognition Technology Branches Out
Richard W. Walker,
News
Law enforcement officials see new security and surveillance uses for license plate recognition technology.
By Richard W. Walker , 4/17/2014
Comment2 comments  |  Read  |  Post a Comment
11 Heartbleed Facts: Vulnerability Discovery, Mitigation Continue
Mathew J. Schwartz,
News
Millions of websites, applications from Cisco and VMware, Google Play apps, as well as millions of Android devices are vulnerable -- and the list keeps growing.
By Mathew J. Schwartz , 4/17/2014
Comment2 comments  |  Read  |  Post a Comment
Federal IT Security Policies Must Be User Friendly
James Bindseil, President & CEO, Globalscape
Commentary
Federal agencies should choose security tools and policies that suit the productivity needs of their employees.
By James Bindseil President & CEO, Globalscape, 4/16/2014
Comment2 comments  |  Read  |  Post a Comment
'Baby Teeth' In Infrastructure Cyber Security Framework
Dave Frymier, Chief Information Security Officer, Unisys
Commentary
NISTís modest effort to improve lax security around IT infrastructure in airports, utilities, and other critical areas now heads to Congress. Don't hold your breath.
By Dave Frymier Chief Information Security Officer, Unisys, 4/14/2014
Comment6 comments  |  Read  |  Post a Comment
Luring The Elusive Cyber Security Pro
W. Hord Tipton,
Commentary
Struggling to find scarce IT security talent? Make sure your hiring managers understand the certifications and match candidates for skills fit -- not just credentials.
By W. Hord Tipton , 4/14/2014
Comment1 Comment  |  Read  |  Post a Comment
Hacker Weev Free After Appeal
Thomas Claburn, Editor-at-Large
News
Andrew "Weev" Auernheimer, who embarrassed AT&T by exposing a security flaw, had his conviction overturned by federal appeals court.
By Thomas Claburn Editor-at-Large, 4/11/2014
Comment9 comments  |  Read  |  Post a Comment
Feds Address Antitrust Concerns On Cyberthreat Sharing
William Jackson, Technology Writer
News
Justice Dept. and FTC confirm that sharing cybersecurity threat information is not an antitrust law violation.
By William Jackson Technology Writer, 4/11/2014
Comment3 comments  |  Read  |  Post a Comment
ICANN Defends Internet Oversight Handoff
William Jackson, Technology Writer
News
Congress hears arguments for and against Commerce Department plans to give up control of many Internet operations.
By William Jackson Technology Writer, 4/10/2014
Comment2 comments  |  Read  |  Post a Comment
Flash Poll: Broken Heartbeat
Marilyn Cohodas, Community Editor, Dark Reading
Commentary
What steps do you plan to take in response to the Heartbleed bug? Take our poll and share your reasons in the comments.
By Marilyn Cohodas Community Editor, Dark Reading, 4/10/2014
Comment0 comments  |  Read  |  Post a Comment
Heartbleed: Examining The Impact
Tim Sapio, Security Analyst, Bishop Fox
Commentary
With Heartbleed, thereís little hope of knowing if an asset was breached, if a breach can be identified, or what, if any, data was leaked. Hereís how to defend against future attacks.
By Tim Sapio Security Analyst, Bishop Fox, 4/10/2014
Comment5 comments  |  Read  |  Post a Comment
Paul Allen Invests In Online Voting Firm
Elena Malykhina, Technology Journalist
News
E-voting firm Scytl receives $40 million from Paul Allen's Vulcan Capital to continue election modernization efforts. Defense Department among its customers.
By Elena Malykhina Technology Journalist, 4/9/2014
Comment6 comments  |  Read  |  Post a Comment
One Year Later: The APT1 Report
Nick Selby, CEO, StreetCred Software, Inc
Commentary
One of the most positive impacts of APT1 is the undeniable rise in the stature of the threat intelligence industry. "Threat Intelligence" is the SIEM, the NAC of 2014.
By Nick Selby CEO, StreetCred Software, Inc, 4/8/2014
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Government, May 2014
NIST's cyber-security framework gives critical-infrastructure operators a new tool to assess readiness. But will operators put this voluntary framework to work?
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Flash Poll
Steal Our Slides
2014 State of Storage Survey
2014 State of Storage Survey
If you look at vendor financials, the enterprise storage business seems stuck in neutral. Don't believe it.
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.