security: Security administration/management
S.C. Security Blunders Show Why States Get Hacked
Governor blames data breach on Russian hackers and the IRS, but states' by-the-book IT ethos shows rules and regulations are the real culprit.
Royal Security Fail: 'May I Speak To Kate?'
The oldest -- and most effective -- social engineering trick in the book remains getting on the phone and impersonating an insider. Ask Kate...
Social Networks Continue Push For Control
The Internet was supposed to facilitate direct connections between individuals and disempower gatekeepers. Instead, it has become a massive...
Should LulzSec Suspect Face Life In Prison?
Computer hacking, identity theft, and fraudulent credit card charges could add up to 30 years to life for alleged Stratfor hacker Jeremy Hammond.
Facebook 'Privacy Notice' Has No Legs
But Facebook should be looking at why the notice went viral.
Petraeus Mission Impossible: Cloaking Email, Online Identities
So-called security experts making basic information security errors isn't a new occurrence. Arguably, it even led to the rise of the Anonymous...
The Petraeus Affair: Surveillance State Stopper?
Lawmakers, now reminded of their own vulnerability, need to strengthen email privacy protections. Companies need to do more to help customers...
5 Items Should Top Obama's Technology Agenda
From infrastructure to tech education, here's what I want to see on the to-do list for the next four years.
5 Emerging Enterprise Technologies
If you are not watching these developments, your business is missing out. Here's what Gartner's annual top 10 tech trends list missed.
Frankenstory: Attack Of The Iranian Cyber Warriors
Citing no hard evidence, U.S. government officials have been stoking fears that the Iranians are out to get us.
Security Newsletter Sign Up
Get timely, actionable insights tailored to the topics you are interested in.
Sign UpTop Stories
-
Microsoft IE Attack Bypasses Key Security Measures
January 03, 2013Microsoft releases temporary fix for Internet Explorer zero-day attack.
-
7 Enterprise Mobility Predictions For 2013
January 03, 2013Smartphones and tablets fueled the rise of BYOD in 2012, but better management of those devices is top of mind in 2013.
-
Rethinking IT Security Architecture
December 28, 2012Experts question the wisdom of current 'layered' cyberdefense strategies as attacks become more sophisticated and breaches abound.
-
Windows 8 Security Stresses Exploit Prevention
December 27, 2012Here's a look at some of the key security features in the Microsoft's new OS.
-
7 Top Information Security Trends For 2013
December 27, 2012From sandboxing enterprise apps on mobile devices to hacking websites via high-bandwidth cloud attacks, experts detail the security trends they...
-
9 Ways Hacktivists Shocked The World In 2012
December 21, 2012Despite the arrests of alleged LulzSec and Anonymous ringleaders, ongoing attacks -- including Muslim hackers disrupting U.S. banks -- prove...
-
London Firefighters Pursue Twitter Monitoring
December 19, 2012London Fire Brigade moves to allow people to summon rescuers via Twitter, parallels "text to 911" efforts in the United States.
-
Europe Weighs New Data Breach Rules For Critical Companies
December 18, 2012Mobile networks, banks, energy companies and other critical infrastructure providers could be required to report all breaches to EU authorities.
-
5 Notorious Insider Attacks Of 2012
December 18, 2012From the recent theft of counterterrorism data from Switzerland's intelligence agency to remotely wiretapping boardroom videoconferencing systems,...
-
Bromium Secures Older PCs, Terminals Via 'Microvisor'
December 17, 2012CTO Simon Crosby says goal is to isolate untrusted tasks on Windows XP machines, thin clients as users bring outside code and content inside the...
More
News »
Slideshows
Resource Links
Related Webcasts
This Week's Issue
Free Print Subscription
SubscribeCurrent Government Issue
- Data Center Optimization: Federal agencies must increase server utilization and energy efficiency as they squeeze more computer processing into fewer data centers. We explore how the Army, Homeland Security, Veterans Affairs and others are doing that.
- Future Cities: The world's urban centers are growing, creating a civic management challenge of unprecedented scope and complexity. Our exclusive survey reveals the opportunities and challenges for city planners and municipal IT pros.
- Read the Current Issue












