The fallout from the Ashley Madison breach continues, offering some surprise lessons for CIOs and IT professionals on how to respond to a very public event.By Larry Loeb Blogger, Informationweek, 8/26/20156 comments | Read | Post a Comment
Today, in the name of public safety, federal and local government agencies are piling up advanced technologies to monitor people, with little regard for the basic principles of privacy. Here's what businesses and individuals need to know.By Pablo Valerio International Business & IT Consultant, 8/26/20157 comments | Read | Post a Comment
Appeals Court ruling solidifies Federal Trade Commission's authority to take action against companies whose data breaches expose customer information.By Dark Reading Staff , 8/24/20153 comments | Read | Post a Comment
As people sift through the Ashley Madison data dump, this massive breach should spark a conversation among IT and security professionals, especially ones who work in the government and cyber-security fields.By Larry Loeb Blogger, Informationweek, 8/22/201515 comments | Read | Post a Comment
Gartner's annual Hype Cycle is out, and IoT and autonomous cars are in this year. Big data, however, is losing some of its luster. By Larry Loeb Blogger, Informationweek, 8/19/201511 comments | Read | Post a Comment
Designed to rescue humans trapped in dangerous terrain, the Atlas robot looks like a punch-drunk Terminator on the loose. It's the latest from Google and its Boston Dynamics firm.By Nathan Eddy Freelance Writer, 8/18/20152 comments | Read | Post a Comment
Despite gaping security holes, email is too entrenched in business communications to go away. Consider these 7 ways to bolster email security and help IT admins sleep easier at night.By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 8/18/20154 comments | Read | Post a Comment
A suppressed security paper shines a light on the shortcomings of the cryptography used to protect keyless vehicle access systems.By Thomas Claburn Editor at Large, Enterprise Mobility, 8/14/20154 comments | Read | Post a Comment
Compliance is difficult in any situation, and cloud computing makes it even more complicated. Check out these worst-case compliance scenarios and how to avoid them.By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 8/12/20150 comments | Read | Post a Comment
IBM and the US Energy Department are working toward creating the next-generation of high-performance computing systems, which they call "data-centric supercomputing." This has business and national security implementations.By William Terdoslavich Freelance Writer, 8/7/20151 Comment | Read | Post a Comment
APT29 cyber espionage attackers operate under the cover of legitimate services including Twitter, Github, and cloud storage services.By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/29/20154 comments | Read | Post a Comment
Google researchers have compared the security practices of experts to non-experts, and identified several ways that typical Internet users can improve their online security.By Thomas Claburn Editor at Large, Enterprise Mobility, 7/27/20156 comments | Read | Post a Comment
Researchers now have proven you can hack a car remotely, and at Black Hat USA will share most -- but not all -- of the details on how they did it.By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/23/201511 comments | Read | Post a Comment
Chief information security officers are considered 'accountable' for breaches while not always in charge of all infosec strategy and purchases, new report shows.By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/21/20151 Comment | Read | Post a Comment
International law enforcement operation shutters Darkode underground cybercrime forum, leads to charges, arrests, searches of 70 members worldwide.By Dark Reading Staff , 7/15/20150 comments | Read | Post a Comment
Katherine Archuleta, the director of the Office of Personnel Management, is the latest casualty of a data breach, but she's certainly not the only one. There's no job security when your job is security.By Thomas Claburn Editor at Large, Enterprise Mobility, 7/14/20152 comments | Read | Post a Comment
InformationWeek Tech Digest August 03, 2015The networking industry agrees that software-defined networking is the way of the future. So where are all the deployments? We take a look at where SDN is being deployed and what's getting in the way of deployments.
Security Job #1 For FedsThe 2014 InformationWeek Government IT Priorities Survey shows federal IT pros care about security - it’s rated as very important by 69% of respondents, 30 percentage points ahead of the No. 2 priority, disaster recovery. Will the upcoming NIST cyber-security framework help manage risk?
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.