Government
Top Stories
10 IT Hiring Trends Confounding Private, Public-Sector CIOs
David Wagner, Executive Editor, Community & IT Life
News
State government CIOs have some of the same hiring problems as their private-business counterparts. Here are 10 of the biggest trends in IT hiring and what executives can do to get the best talent.
By David Wagner Executive Editor, Community & IT Life, 4/20/2015
Comment7 comments  |  Read  |  Post a Comment
5 Cyberwar Threats Worth Watching
Joe Stanganelli, Attorney, Beacon Hill Law
News
Approximately 60 nation-states are presently developing their own advanced cyber warfare programs.
By Joe Stanganelli Attorney, Beacon Hill Law, 4/16/2015
Comment2 comments  |  Read  |  Post a Comment
News & Commentary
Delivery Drone Or Death Machine?
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Drones can help or harm. Figuring out how to respond to them isn't going to be easy.
By Thomas Claburn Editor at Large, Enterprise Mobility, 4/26/2015
Comment2 comments  |  Read  |  Post a Comment
Defense Secretary Outlines New Cybersecurity Strategy
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Russian hackers were caught infiltrating unclassified military networks earlier this year, he said.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/24/2015
Comment1 Comment  |  Read  |  Post a Comment
DHS Courts Private Sector For Threat Intelligence-Sharing
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Homeland Security NCCIC now STIX- and TAXII-enabled for automated machine-to-machine sharing of intel, agency officials told attendees at the RSA Conference.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/23/2015
Comment1 Comment  |  Read  |  Post a Comment
Your Audi As Amazon Package Drop
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Amazon, Audi, and DHL plan to test delivering packages to the trunk of your car.
By Thomas Claburn Editor at Large, Enterprise Mobility, 4/23/2015
Comment10 comments  |  Read  |  Post a Comment
Box Looks Beyond Storage
Thomas Claburn, Editor at Large, Enterprise Mobility
News
At its second annual developer conference, Box rearranged its platform to entice enterprise developers.
By Thomas Claburn Editor at Large, Enterprise Mobility, 4/23/2015
Comment1 Comment  |  Read  |  Post a Comment
Hubble Telescope: 25 Years Of Stunning Images
Nathan Eddy, Freelance Writer
News
In celebration of the Hubble Space Telescope's 25th year in low-Earth orbit, InformationWeek has taken a selection of some of the craft's most stunning and awe-inspiring photos, which explore the far reaches of our galaxy and beyond -- pictures that truly define the phrase "out of this world."
By Nathan Eddy Freelance Writer, 4/22/2015
Comment8 comments  |  Read  |  Post a Comment
Bypassing The Password, Part 3: Freedom Compromised
Joe Stanganelli, Attorney, Beacon Hill Law
Commentary
Want to protect your privacy from government snoops? Say no to biometrics. Say yes to strong password protection and encryption.
By Joe Stanganelli Attorney, Beacon Hill Law, 4/22/2015
Comment4 comments  |  Read  |  Post a Comment
Bypassing The Password, Part 2: Trusted Identities
Joe Stanganelli, Attorney, Beacon Hill Law
Commentary
The federal government's collaborative efforts with the private sector to "mov[e] beyond the password" are difficult to trust when there are potentially ulterior motives at play.
By Joe Stanganelli Attorney, Beacon Hill Law, 4/21/2015
Comment4 comments  |  Read  |  Post a Comment
Plan X: DARPA's Revolutionary Cyber Security Platform
Joe Stanganelli, Attorney, Beacon Hill Law
News
DARPA's Plan X aims to make active cyber defense more accessible to the masses through agility, training, and intuitive interfaces.
By Joe Stanganelli Attorney, Beacon Hill Law, 4/21/2015
Comment1 Comment  |  Read  |  Post a Comment
White House's Daniel 'Intrigued' By UL-Type Model For IoT Security
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Michael Daniel, the national cybersecurity coordinator and assistant to the President, talks Internet of Things security and recent Executive Orders on intel-sharing and sanctions.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/20/2015
Comment1 Comment  |  Read  |  Post a Comment
Android Wear Promises Less Phone Dependence
Thomas Claburn, Editor at Large, Enterprise Mobility
News
The latest update to Android for wearable devices allows connections with phones on distant networks.
By Thomas Claburn Editor at Large, Enterprise Mobility, 4/20/2015
Comment8 comments  |  Read  |  Post a Comment
Bypassing The Password, Part 1: Windows 10 Scaremongering
Joe Stanganelli, Attorney, Beacon Hill Law
Commentary
Microsoft's hype of its upcoming biometrics system in Windows 10, spouting the virtues of biometrics over traditional password-based security, seems misguided at best -- misleading at worst.
By Joe Stanganelli Attorney, Beacon Hill Law, 4/20/2015
Comment11 comments  |  Read  |  Post a Comment
10 IT Hiring Trends Confounding Private, Public-Sector CIOs
David Wagner, Executive Editor, Community & IT Life
News
State government CIOs have some of the same hiring problems as their private-business counterparts. Here are 10 of the biggest trends in IT hiring and what executives can do to get the best talent.
By David Wagner Executive Editor, Community & IT Life, 4/20/2015
Comment7 comments  |  Read  |  Post a Comment
HIMSS15: The 'Year Of Execution' For Data Sharing
Mark Braunstein, Professor of the Practice, Georgia Institute of Technology
Commentary
The industry is focusing less on electronic record features and more on sharing the data held in them.
By Mark Braunstein Professor of the Practice, Georgia Institute of Technology, 4/17/2015
Comment0 comments  |  Read  |  Post a Comment
L.A. District Seeks Refund From Apple Amid Investigations
Thomas Claburn, Editor at Large, Enterprise Mobility
News
The Los Angeles Unified School District's ambitious plan to provide an iPad for every student has been derailed by questions about the contract bidding process and dissatisfaction with the software.
By Thomas Claburn Editor at Large, Enterprise Mobility, 4/17/2015
Comment8 comments  |  Read  |  Post a Comment
APT Group 'Pawn Storm' Ratchets Up Attacks
Jai Vijayan, Freelance writer
News
Threat actors have set up several new C&C servers and dozens of new malicious URLs -- and now targeting White House staffers, Trend Micro says.
By Jai Vijayan Freelance writer, 4/17/2015
Comment0 comments  |  Read  |  Post a Comment
Space X, Hubble, Coffee: The Cost Of Doing Business In Space
David Wagner, Executive Editor, Community & IT Life
Commentary
Space is expensive, dangerous, and easy to get wrong. This week, news about Space X, the upcoming Hubble anniversary, and the price of astronaut coffee shows why we should think hard about future projects.
By David Wagner Executive Editor, Community & IT Life, 4/17/2015
Comment21 comments  |  Read  |  Post a Comment
Cyanogen Partners With Microsoft To Challenge Google
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Cyanogen's version of Android will include Microsoft apps and services.
By Thomas Claburn Editor at Large, Enterprise Mobility, 4/16/2015
Comment2 comments  |  Read  |  Post a Comment
Why Companies Should Pay Attention To AngularJS
Michi Kono, CTO of Monsoon
Commentary
When Google and Microsoft collaborate on a project, it's worth noting.
By Michi Kono CTO of Monsoon, 4/16/2015
Comment2 comments  |  Read  |  Post a Comment
Google Disputes EU Antitrust Charges
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Google insists that its conduct has been lawful and beneficial to the market.
By Thomas Claburn Editor at Large, Enterprise Mobility, 4/15/2015
Comment4 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Register for InformationWeek Newsletters
White Papers
Current Issue
Time to Reconsider Enterprise Email Strategy
Time to Reconsider Enterprise Email Strategy
Cost, time, and risk. It's the demand trifecta vying for the attention of both technology professionals and attorneys charged with balancing the expectations of their clients and business units with the hard reality of the current financial and regulatory climate. Sometimes, organizations assume high levels of risk as a result of their inability to meet the costs involved in data protection. In other instances, it's time that's of the essence, as with a data breach.
Flash Poll
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of April 19, 2015.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
UBM's Future Cities
Latest Stories from UBM's Future Cities
View All from Future Cities