Government
Top Stories
Cyber Espionage Incidents Triple: Verizon Report
William Jackson, Technology Writer
News
As cyber espionage grows quickly, government agencies become the No. 1 target, finds 2014 Data Breach Investigations Report.
By William Jackson Technology Writer, 4/22/2014
Comment4 comments  |  Read  |  Post a Comment
Sensitive Data: What Constitutes 'Reasonable Protection'?
Wyatt Kash, Editor, InformationWeek Government
Commentary
NIST's Cybersecurity Framework takes on new context for industry execs in light of FTC lawsuit against the Wyndham hotel chain over data security lapses.
By Wyatt Kash Editor, InformationWeek Government, 4/22/2014
Comment7 comments  |  Read  |  Post a Comment
News & Commentary
Data Security: Think Outside The Box
Jeff Rubin, Co-Founder & VP, Beachhead Solutions
Commentary
What the public and private sector can learn from each other's data security priorities is an exercise in nuance that is well worth the effort. Here's why.
By Jeff Rubin Co-Founder & VP, Beachhead Solutions, 4/23/2014
Comment0 comments  |  Read  |  Post a Comment
Samsung Attacks In Patent Case
Magnus Thordarson,
News
Samsung's case against Apple begins; patent infringement complaint against Apple centers on smartphone technology for image storage, video capture, compression, and transmission across devices.
By Magnus Thordarson , 4/22/2014
Comment3 comments  |  Read  |  Post a Comment
Contacting Congress Just Got Easier
Elena Malykhina, Technology Journalist
News
Electronic Frontier Foundation and more than 100 volunteer developers are working on a tool that pairs public domain data with free software interfaces.
By Elena Malykhina Technology Journalist, 4/22/2014
Comment3 comments  |  Read  |  Post a Comment
Cyber Espionage Incidents Triple: Verizon Report
William Jackson, Technology Writer
News
As cyber espionage grows quickly, government agencies become the No. 1 target, finds 2014 Data Breach Investigations Report.
By William Jackson Technology Writer, 4/22/2014
Comment4 comments  |  Read  |  Post a Comment
Sensitive Data: What Constitutes 'Reasonable Protection'?
Wyatt Kash, Editor, InformationWeek Government
Commentary
NIST's Cybersecurity Framework takes on new context for industry execs in light of FTC lawsuit against the Wyndham hotel chain over data security lapses.
By Wyatt Kash Editor, InformationWeek Government, 4/22/2014
Comment7 comments  |  Read  |  Post a Comment
No-Poaching Settlement Could Spur Tech Talent War
Thomas Claburn, Editor-at-Large
News
Adobe, Apple, Google, and Intel reportedly close to settling a lawsuit over agreements not to recruit each other's employees. Tech pros could benefit from more open market.
By Thomas Claburn Editor-at-Large, 4/22/2014
Comment10 comments  |  Read  |  Post a Comment
Protecting Critical Infrastructure: A New Approach
William Jackson, Technology Writer
News
NIST's cyber-security framework gives critical-infrastructure operators a new tool to assess readiness. But will operators put this voluntary framework to work?
By William Jackson Technology Writer, 4/21/2014
Comment1 Comment  |  Read  |  Post a Comment
Cyber Security Insurance Market
William Jackson, Technology Writer
News
Cross-industry standards could spur more affordable cyber security insurance.
By William Jackson Technology Writer, 4/21/2014
Comment1 Comment  |  Read  |  Post a Comment
Secure Collaboration Tool Aims to Stop Data Leaks
Henry Kenyon,
News
BAE Systems' leakage-prevention Secure Information Broker Appliance program edits info your organization doesn't want outsiders to see.
By Henry Kenyon , 4/18/2014
Comment1 Comment  |  Read  |  Post a Comment
License Plate Recognition Technology Branches Out
Richard W. Walker,
News
Law enforcement officials see new security and surveillance uses for license plate recognition technology.
By Richard W. Walker , 4/17/2014
Comment2 comments  |  Read  |  Post a Comment
NASA Tests Technologies For Deep Space Exploration
Elena Malykhina, Technology Journalist
News
An oxygen recycling system, optical communications, and a deep space atomic clock top the space agency's list of priorities.
By Elena Malykhina Technology Journalist, 4/17/2014
Comment0 comments  |  Read  |  Post a Comment
Accountable Care Success Requires Strong Health IT
Alison Diana, Senior Editor
News
The accountable care organization model has produced mixed results to date. In ACO success stories, technologies such as analytics play a big role.
By Alison Diana Senior Editor, 4/16/2014
Comment0 comments  |  Read  |  Post a Comment
Federal IT Security Policies Must Be User Friendly
James Bindseil, President & CEO, Globalscape
Commentary
Federal agencies should choose security tools and policies that suit the productivity needs of their employees.
By James Bindseil President & CEO, Globalscape, 4/16/2014
Comment2 comments  |  Read  |  Post a Comment
ICD-10 Delay: Politics Trump Health Data Quality
Mark Braunstein,
Commentary
With a fresh delay for ICD-10 compliance, US healthcare providers and patients remain trapped in debate. Is higher quality clinical data worth the cost of more detailed data collection?
By Mark Braunstein , 4/16/2014
Comment6 comments  |  Read  |  Post a Comment
Top 10 Upsides To Healthcare.gov Debacle
Rob Preston, VP & Editor in Chief, InformationWeek
News
You didn't know there was a bright side to the botched rollout of the Obamacare website? Get your snark on.
By Rob Preston VP & Editor in Chief, InformationWeek, 4/16/2014
Comment6 comments  |  Read  |  Post a Comment
Google Maps Shows Crimea As Russian To Russians
Thomas Claburn, Editor-at-Large
News
Google makes Crimea part of Russia on the Russian version of Google Maps and draws protests and scrutiny.
By Thomas Claburn Editor-at-Large, 4/15/2014
Comment18 comments  |  Read  |  Post a Comment
Army ERP System Enables Financial Transparency
Henry Kenyon,
News
Antiquated systems have made it impossible for the Army to audit its finances. A new ERP coming online will help solve that problem.
By Henry Kenyon , 4/15/2014
Comment0 comments  |  Read  |  Post a Comment
Georgia Solves Campaign Finance Data Challenge Via OCR
Richard W. Walker,
News
In a project to make financial disclosure and campaign contribution data public, Georgia turns to Captricity's hybrid system, which combines machine learning and human intelligence to digitize handwritten forms.
By Richard W. Walker , 4/15/2014
Comment0 comments  |  Read  |  Post a Comment
Hubble Turns 24: 5 Biggest Discoveries
Elena Malykhina, Technology Journalist
News
The Hubble Space Telescope has helped solve huge questions about space. Coming next: Its successor will look back even further into time.
By Elena Malykhina Technology Journalist, 4/15/2014
Comment1 Comment  |  Read  |  Post a Comment
Google Has Plans For Titan Drones
Thomas Claburn, Editor-at-Large
News
Titan Aerospace's drones are expected to help deliver Internet connectivity to remote regions.
By Thomas Claburn Editor-at-Large, 4/15/2014
Comment3 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Government, May 2014
Protecting Critical Infrastructure: A New Approach NIST's cyber-security framework gives critical-infrastructure operators a new tool to assess readiness. But will operators put this voluntary framework to work?
Steal Our Slides
2014 State of Storage Survey
2014 State of Storage Survey
If you look at vendor financials, the enterprise storage business seems stuck in neutral. Don't believe it.
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.