Thursday, February 7, 2013

Energy Dept. Data Breach: 6 Motivations | Hacking, Privacy Laws Need Reboot?

If you have trouble viewing this email, read the online version.

InformationWeek Government
Join the community
Facebook Twitter LinkedIn
  Thursday, February 7, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
CIO Columnist 6 Reasons Hackers Would Want Energy Department Data
By Mathew J. Schwartz
In Department of Energy breach, what was driving attackers to steal employee data? Stuxnet revenge is one theory.

Hacking, Privacy Laws: Time To Reboot
Recent cases highlight serious flaws in current privacy and cyber abuse legislation, allowing prosecutors to wield a hammer when a stick will do.

Fed Breach: Attackers Exploited Website Product Vulnerability
Federal Reserve confirms breach of database with banking executive contact information for use in a natural disaster.

DARPA Funds Python Big Data Effort
Department of Defense has dished out $3 million for Python big data analytics libraries from a $100 million fund for big data research and development.

White House Seeks Tech Innovation Fellows
Program recruits innovators and entrepreneurs to work on "high impact" federal IT projects during six- to 12-month tours of duty.

Feds Update Flu Apps
Centers for Disease Control have updated their two flu apps -- FluView and CDC Influenza -- for the busy flu season.

Microsoft, Symantec Torpedo Massive Botnet
Tech companies team up to take down Bamital botnet, which generated over $1 million annually via search engine click fraud.

ALSO SEE
Feds Update Flu Apps
Microsoft, Symantec Torpedo Massive Botnet
Strategy: One-Click Disaster Recovery
Best Practices Guide for IT Governance & Compliance
Windows Phone Tops BlackBerry In U.S.
Big Data Analytics: Is Your Elephant Enterprise Ready?
2013 InformationWeek Government IT Innovators

Download our iPad App

JOIN THE CONVERSATION
Posted By MyW0r1d:
"Looks like the only result was a political one without delving into where our senior military commanders focus is if they can deal with 30000 emails from an obviously well connected socialite."
In reply to: Hacking, Privacy Laws: Time To Reboot
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD DARK READING'S LATEST DIGITAL ISSUE
Wily attackers are using shape-shifting malware to fool your defenses. Are you ready?

Also in the new, all-digital issue of Dark Reading: The shift in hacking requires a new defense mindset.


DOWNLOAD NOW FREE (Registration Required)
 

 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Strategy: One-Click Disaster Recovery
Automation and orchestration are all the rage among IT architects these days. One of the best places to apply the technology is to disaster recovery. Most organizations still want a "go" button, but after that, timely recovery requires automation. Here's what you need to know to make it happen.
Download Now (Registration Required)

Featured Report
How to Conduct an Effective IT Security Risk Assessment
Assessing an organization's security risk is an important element of an effective enterprise security strategy. It's also a key way to justify future security spending to upper management. In this Dark Reading report, we recommend how to conduct an IT security risk assessment -- and how to translate the results into terms that make sense in dollars.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Best Practices Guide for IT Governance & Compliance
Federal regulations and internal policies both require businesses to know exactly what changes are being made to structured and unstructured data in their corporate networks. This white paper explains the key provisions of four important federal regulations (HIPAA, GLBA, SOX and PCI DSS) details the three steps for establishing and maintaining compliance.
Download Now (Registration Required)


Bloomberg BusinessWeek Agility for Differentiation
Organizations are finding that a cloud-based platform for agile software development provides the speed and flexibility they need to respond to opportunities and market changes. But this will not happen overnight. This research report highlights how organizations are implementing and benefiting from cloud-based agile software development.
Download Now (Registration Required)


MORE WHITEPAPERS
 
MOST POPULAR NEWS
Windows Phone Tops BlackBerry In U.S.
Windows Phone sales exceeded BlackBerry sales in the U.S. during the fourth quarter of 2012, says Strategy Analytics.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Samsung Galaxy S IV: What To Expect
Samsung's Galaxy S phones have become the closest thing to the mythical "iPhone killer" of Android fans' dreams. Here's a look at the next version's likely features.

Anonymous Claims Wall Street Data Dump
Hacktivist group publishes 4,000 passwords as part of Operation Last Resort campaign seeking revenge for the treatment of Internet activist Aaron Swartz.

Top 10 Tech Fails Of 2012
Sometimes technology disappoints. Here are some of the products, services and companies that let us down in 2012.





MORE NEWS  
 
WEBCASTS
Big Data Analytics: Is Your Elephant Enterprise Ready?
Hadoop's cost effective scalability and flexibility to analyze all data types is driving organizations everywhere to embrace big data analytics. From proof of concept to deployment across the enterprise, join Datameer and Hortonworks as we answer the 'now what?' when rolling out your Hadoop big data analytics project. More Information & Registration

Click here
 
RESOURCES AND EVENTS
2013 InformationWeek Government IT Innovators
InformationWeek's 2013 Government IT Innovators program will feature the most innovative government IT organizations in the 2013 InformationWeek 500 issue and on InformationWeek.com. Does your organization have what it takes?
Nominate By April 12



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Government
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of the InformationWeek Government Newsletter go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment