Government IT News, Analysis, & Advice - InformationWeek
IoT
IoT
Government
News & Commentary
Data Breach Costs Drop Globally But Increase in US
Kelly Sheridan, Associate Editor, Dark Reading
News
The average total cost of a data breach declined 10% year-over-year around the world, but in the US edged upward by 5%.
By Kelly Sheridan Associate Editor, Dark Reading, 6/20/2017
Comment0 comments  |  Read  |  Post a Comment
Digital Infrastructure for Cities Leads to Big Savings
Charles Babcock, Editor at Large, Cloud
News
A Cisco report claims $2.3 trillion is waiting to be realized through digitized services, city management; cites Houston, Oslo, Barcelona as examples.
By Charles Babcock Editor at Large, Cloud, 6/16/2017
Comment1 Comment  |  Read  |  Post a Comment
GDPR Puts Response at Center Stage for All Companies
Guest Commentary, Guest Commentary
Commentary
When the General Data Protection Regulation (GDPR) takes effect in May 2018, a company’s ability to respond to a data breach will be paramount. The majority of companies already struggle with responding to cyber incidents, and even fewer are prepared for GDPR.
By Ted Julian, VP of product management and Co-Founder, IBM Resilient , 6/15/2017
Comment1 Comment  |  Read  |  Post a Comment
Ex-CIA Director Brennan Warns of More Collaboration Between Nation-States and Cybercriminals
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Former CIA head said retaliatory hacking options 'actively being discussed in government circles.'
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/14/2017
Comment0 comments  |  Read  |  Post a Comment
Outdated Operating Systems, Browsers Correlate with Real Data Breaches
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Study shows companies running out-of-date OSes were three times more likely to suffer a data breach, and those with the outdated browsers, two times more likely.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/8/2017
Comment1 Comment  |  Read  |  Post a Comment
Wanted: Protection From Intrusive Hacks for Connected Vehicles
Charles Babcock, Editor at Large, Cloud
News
Cloud Security Alliance sees danger, issues guidelines for how we'll need to secure the connected vehicle environment in the future.
By Charles Babcock Editor at Large, Cloud, 5/26/2017
Comment0 comments  |  Read  |  Post a Comment
You Have One Year to Make GDPR Your Biggest Security Victory Ever
Sara Peters, Senior Editor at Dark Reading
News
The EU's new razor-toothed data privacy law could either rip you apart or help you create the best security program you've ever had. Here's how.
By Sara Peters Senior Editor at Dark Reading, 5/25/2017
Comment14 comments  |  Read  |  Post a Comment
Data: Lifeblood of the Internet of Things
Guest Commentary, Guest Commentary
Commentary
As computing power becomes increasingly distributed into the devices and infrastructure around us, the data generated by those devices will invariably play a larger role in our businesses and everyday lives.
By Tim Bucher, Senior Vice President, Seagate Technology , 5/24/2017
Comment0 comments  |  Read  |  Post a Comment
Researchers Investigate Possible Connection Between WannaCry & North Korean Hacker Group
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Google, Kaspersky Lab and Symantec all have found common code in the WannaCry malware and that of the nation-state hackers behind the mega breach of Sony.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/15/2017
Comment2 comments  |  Read  |  Post a Comment
Trump Issues Previously Delayed Cybersecurity Executive Order
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
EO calls for immediate review of federal agencies' security postures, adoption of the NIST Framework, and a focus on critical infrastructure security.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/11/2017
Comment0 comments  |  Read  |  Post a Comment
A Closer Look at CIA-Linked Malware as Search for Rogue Insider Begins
Kelly Sheridan, Associate Editor, Dark Reading
News
Symantec researcher explains the goals behind CIA-linked hacking tools, as the government launches an investigation to discover who gave secret documents to WikiLeaks.
By Kelly Sheridan Associate Editor, Dark Reading, 4/24/2017
Comment1 Comment  |  Read  |  Post a Comment
Finding Just the Facts in Government Data
James M. Connolly, Executive Managing Editor, InformationWeekEditor in Chief
Commentary
Steve Ballmer's new venture is striving to turn billions of bits of government data into facts.
By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 4/18/2017
Comment3 comments  |  Read  |  Post a Comment
Moving to the Cloud: 3 Ways to Ensure Data Sovereignty
Guest Commentary, Guest Commentary
Commentary
Navigating the maze of data sovereignty laws can be intimidating, organizations should not let this deter them from making the move if companies do their due diligence.
By Allan Leinwand, ServiceNow CTO , 4/17/2017
Comment0 comments  |  Read  |  Post a Comment
Future of Data Summit: Secure IoT with Blockchain
Jessica Davis,  Senior Editor, Enterprise Apps
Satire
IoT security is essential for the Internet of Things to reach commercial success. Here's one way to protect this technology and data from hackers.
By Jessica Davis Senior Editor, Enterprise Apps, 4/11/2017
Comment5 comments  |  Read  |  Post a Comment
Expanding a Culture of Innovation in Government
Guest Commentary, Guest Commentary
Commentary
Governments have an opportunity to continue as leaders in innovation, but that role may require some changes in the leadership mindset and strategy.
By Gaurav Gujral, Accenture , 4/10/2017
Comment0 comments  |  Read  |  Post a Comment
Lessons in Government and the State of Your IT
Guest Commentary, Guest Commentary
Commentary
Have you ever considered how state and local government IT departments differ from yours? The challenges are unique, the solutions creative, and the lessons learned could help the private sector more effectively assess and enhance the state of their own IT.
By Doug Hazelman, vice president, Veeam Software , 4/4/2017
Comment0 comments  |  Read  |  Post a Comment
DoJ Indicts Russian FSB Officers and Cybercriminals in Yahoo Breach
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Russian intelligence officials hired renowned cybercriminals to do their bidding in massive hacks that compromised Yahoo, Gmail, and other email accounts of millions of people in the US, Russia, elsewhere.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 3/15/2017
Comment4 comments  |  Read  |  Post a Comment
Future of Data Summit Tackles AI, Machine Learning
Jessica Davis,  Senior Editor, Enterprise Apps
Satire
Learn about how real-world enterprise organizations are advancing projects in AI, machine learning, virtual reality, and more, to add value for consumers and drive revenues.
By Jessica Davis Senior Editor, Enterprise Apps, 3/14/2017
Comment2 comments  |  Read  |  Post a Comment
Most Federal Government Websites Lack Basic Security
Steve Zurier, Freelance Writer
News
HTTPS and DNSSEC not used across the board on agency websites despite federal requirements to do so.
By Steve Zurier Freelance Writer, 3/9/2017
Comment0 comments  |  Read  |  Post a Comment
Cookie Law vs. GDPR: What's the Difference?
Guest Commentary, Guest Commentary
Commentary
If you are wondering what to do to prepare for the EU's GDPR, the best advice is simply logical.
By Todd Ruback, Chief Privacy Officer, Evidon , 3/8/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll