News & Commentary
Latest Content tagged with Cybersecurity
Page 1 / 2   >   >>
Bypassing The Password, Part 2: Trusted Identities
Commentary  |  4/21/2015  | 
The federal government's collaborative efforts with the private sector to "mov[e] beyond the password" are difficult to trust when there are potentially ulterior motives at play.
Plan X: DARPA's Revolutionary Cyber Security Platform
Slideshows  |  4/21/2015  | 
DARPA's Plan X aims to make active cyber defense more accessible to the masses through agility, training, and intuitive interfaces.
Bypassing The Password, Part 1: Windows 10 Scaremongering
Commentary  |  4/20/2015  | 
Microsoft's hype of its upcoming biometrics system in Windows 10, spouting the virtues of biometrics over traditional password-based security, seems misguided at best -- misleading at worst.
10 IT Hiring Trends Confounding Private, Public-Sector CIOs
Slideshows  |  4/20/2015  | 
State government CIOs have some of the same hiring problems as their private-business counterparts. Here are 10 of the biggest trends in IT hiring and what executives can do to get the best talent.
Clintonemail.com: A Cautionary Call To Action
Commentary  |  3/23/2015  | 
As former Secretary of State Hillary Clinton becomes ever more embattled in the press and in politics because of her personal email usage, we can draw lessons for enterprises and employees alike on contending with Shadow IT.
Clinton Email Fail: Worst Government Security Flubs
Slideshows  |  3/17/2015  | 
Hillary Clinton isn't the first politician to have committed a data compliance faux pas when it comes to email. CIOs, compliance departments, and privacy officers would do well to learn from the mistakes of those who screwed up before her.
BlackBerry, Samsung SecuTablet Offers Security For Business, Government Data
Commentary  |  3/16/2015  | 
The SecuTablet is a Samsung Galaxy Tab S that's secured for governments and businesses by BlackBerry's Secusmart service.
Warrant Canaries: Watching US Agencies So IT Doesn't Have To
Commentary  |  3/4/2015  | 
ISPs and others are unofficially sounding the alarm in the event that a US government agency is seeking access to user records. Here's why this matters to IT.
How Data Restrictions Hurt The Global Economy
Commentary  |  3/3/2015  | 
Many countries are creating policies to restrict the flow of data, driven by privacy or protectionist concerns. Such limits could stifle economic growth.
Why Kaspersky’s Bank Robbery Report Should Scare Us All
Commentary  |  2/18/2015  | 
So, you don't work for a financial institution? Don't think you're off the hook for the kind of theft discussed by Kaspersky. Banks are certainly not the only organizations moving around massive amounts of money every day.
Android To Become 'Workhorse' Of Cybercrime
Commentary  |  2/16/2015  | 
Android and Windows laptops dead even in infection rates for the year 2014.
Obama, Tim Cook, Others Debate Sharing Cyber Security Data
News  |  2/14/2015  | 
The Obama White House wants more effective sharing of cyber security data between the public and private sectors. Despite some snubs, Apple's Tim Cook spoke at a special summit on the issue.
Anthem Hack: Lessons For IT Leaders
Commentary  |  2/12/2015  | 
There are two key lessons that IT can learn from the Anthem breach.
Smart Cars Vulnerable To Security Hacks, Report Finds
Commentary  |  2/9/2015  | 
A US senator's report finds that carmakers are leaving vehicles open to intrusive attacks that can steal personal data and take over controls.
White House Revises Rules For Intelligence Gathering
News  |  2/3/2015  | 
Intelligence agencies like the NSA face data-retention limits and privacy training.
Enterprise Drones: What CIOs Should Know
Commentary  |  1/16/2015  | 
Flying drones are coming to the enterprise: Will CIOs and the FAA be ready?
InformationWeek 2014 Strategic Security Survey
Steal Our Slides  |  1/9/2015  | 
Managing the complexity of security is the top concern for enterprise IT teams. Look for a new era of more sophisticated data analysis in the coming year.
Privacy By Design: Protect User Data From 'Get-Go'
News  |  1/5/2015  | 
International effort seeks to bake in consumer privacy options.
Government IT In 2014: GAO's Critique
News  |  12/15/2014  | 
From cloud computing to data center consolidation, software licensing to data transparency, the GAO was watching.
Iowa Mobile ID Program Raises Privacy Questions
News  |  12/12/2014  | 
The state of Iowa proposes using a mobile app as an option to a traditional driver's license -- but security questions abound.
InformationWeek 2014 Mobile Security Survey
Steal Our Slides  |  12/12/2014  | 
Securing company data on mobile devices is the top concern when it comes to mobile security. Respondents worry most about data loss due to lost or stolen devices, and less than half of respondents feel confident that data is protected.
4 Worst Government Data Breaches Of 2014
News  |  12/11/2014  | 
Government agency breaches pale in comparison to private sector companies' problems, but government did get hacked in 2014. Look at the four biggest incidents.
Security Armchair Quarterbacks: Go Away
Commentary  |  12/9/2014  | 
Cyber criminals will never go away. Instead of looking for a silver bullet, be proactive, interactive, and focus on reducing risk.
Blackphone Adds Secure App Store
News  |  12/9/2014  | 
Update to PrivatOS adds a dedicated storefront and segregated work spaces.
Senate Bill Prohibits Government-Mandated Backdoors
News  |  12/5/2014  | 
Bill represents a response to government officials who want a way to bypass encryption in technology products.
FCC: Too Many Phones Still Being Stolen
News  |  12/5/2014  | 
FCC tasks carriers and law enforcement to do more to deter smartphone theft.
Why FBI Is Wrong On Encryption Workaround
Commentary  |  12/3/2014  | 
Such a measure would invade privacy, extend government overreach, and hurt US tech companies.
Senate Explores Outsourcing Security Services
News  |  12/2/2014  | 
The US Senate might outsource core cyber security support to a managed security service. Candidate tasks include network security monitoring, threat analysis, incident reporting, vulnerability analysis, and security engineering and research.
Microsoft Windows 8.1 Rises As Win XP Plummets
News  |  12/2/2014  | 
After struggling for months to gain users, Windows 8 and 8.1 finally have eclipsed Windows XP in market share.
FDA Scrutinizes Networked Medical Device Security
Commentary  |  12/1/2014  | 
Federal agencies are trying to address threats to the privacy and security of people using connected medical devices.
What Healthcare Can Learn From CHS Data Breach
Commentary  |  11/25/2014  | 
Security breach that exposed personal data on 4.5 million Tennessee healthcare system patients offers key lessons to prevent similar cyber attacks.
USPS Played Cat And Mouse With Cyber Attacker
News  |  11/24/2014  | 
Postal Service takes restrained, methodical approach to cyberattack. Was this the right strategy?
Ghostery Makes Privacy Marketable
News  |  11/24/2014  | 
Service that blocks Web tracking code turns out to be good for business, too.
7 Important Tech Regulatory Issues In 2015
Slideshows  |  11/19/2014  | 
From net neutrality to patent reform and drones, these regulations will be in the spotlight. See what's at stake.
TRUSTe Not So Trustworthy
News  |  11/17/2014  | 
Privacy certification company has agreed to pay $200,000 to settle FTC charges that it deceived consumers.
DoD Changes Cloud Computing Policy
News  |  11/17/2014  | 
Changing culture is just as important as new technology, CIO Halvorsen says.
ATP: Don't Give Up On Prevention
Commentary  |  11/13/2014  | 
As businesses rely on more complex systems with more tools from different vendors, traditional security measures are becoming increasingly inadequate.
Americans Doubt They Can Protect Their Privacy
News  |  11/13/2014  | 
A Pew Research Center study finds broad concern about government and corporate data gathering, along with a desire for more government regulation of data gathering.
IBM Launches Cross-Cloud Security Protection
News  |  11/5/2014  | 
IBM's Dynamic Cloud Security can monitor and analyze data access activity and applications in IBM SoftLayer, Salesforce.com, and Amazon.
Cyberspace Expands Threat Matrix
News  |  11/3/2014  | 
National security experts warn there is no privacy or security any more.
Facebook Adds Tor Support
News  |  10/31/2014  | 
Facebook wants to allow people to use its service without being watched or censored. Is that some kind of privacy oxymoron?
Cyber Security Law Vs. Partisan Politics
Commentary  |  10/31/2014  | 
Cyber security sometimes turns up as a campaign issue, but effective legislation has stalled. It's time for a rational approach to regaining trust in our digital world.
VA Buckles Down On Cyber Security, Program Management
News  |  10/30/2014  | 
Agency refocuses IT priorities on data protection, on-time project delivery to overcome past poor performance.
Dear Elon Musk: AI Demon Not Scariest
Commentary  |  10/29/2014  | 
Elon Musk sees AI as a threat to our existence. I see more immediate problems.
Chipmaker Disables Counterfeits With Software Update
News  |  10/28/2014  | 
FTDI's update, targeting counterfeit chips, could disable systems widely embedded in healthcare, critical infrastructure, and consumer products.
In Government, No Excuse For Missing Documents
News  |  10/27/2014  | 
To meet regulatory obligations -- and avoid accusations of cover-up and incompetence -- federal agencies must get serious about digitizing records.
This Week In 60 Seconds: Crypto Outcry, Compliance & More
Commentary  |  10/24/2014  | 
Hot stories this week include saying 'No' to crypto backdoors for law enforcement, new roles for IT on Wall Street, and more.
DHS Investigates Dozens Of Medical Device Cybersecurity Flaws
News  |  10/23/2014  | 
Department of Homeland Security reportedly investigating two-dozen products from major medical device manufacturers for security holes.
Why Outlawing Encryption Is Wrong
Commentary  |  10/22/2014  | 
Putting data encryption solely into the hands of government employees won't prevent bad things from happening -- and it might encourage wrongdoing.
Internet Of Things Will Turn Networks Inside-Out
Commentary  |  10/20/2014  | 
If IoT is ever going to work, networks will have to grant access to devices that we'd refuse outright today.
Page 1 / 2   >   >>


Register for InformationWeek Newsletters
White Papers
Current Issue
Video
Slideshows
Twitter Feed
InformationWeek Radio
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.