Cybersecurity
'We don't have a way to code good guy'
A "magical rainbow unicorn key" for encrypted devices may be what law enforcement wants, but such access could mean bad actors would also have access to data, privacy activists argue.
Modernization
Massive Security Breach Hits Apple’s App Store in China
Chinese users who download some of the nation’s most popular apps could find their personal information extracted by hackers, security experts say.
Cybersecurity
Pentagon Races to Boost Cyber Troop Size
But do the code warriors have the right stuff?
Cybersecurity
Hackers Fool Bitpay Execs and Expose Lloyds Premier Account Holders, While Insiders Accidentally Leak Patient Records on Amazon Cloud
Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.
Cybersecurity
Hacker Cons Virtual Currency Processor Bitpay Out of $1.8M
Financial Services // Web Services // Georgia, United States
Cybersecurity
Contractor Mistakenly Publishes 1.5 Million Confidential Patient Records on Amazon Web Services
Government (U.S.) // Healthcare and Public Health
Cybersecurity
N.C. School District Leaks Details on Potential Hires
Education // North Carolina, United States
Cybersecurity
If You Fall for a Phishing Scam, Should You Lose Your Security Clearance?
CISOs are concerned about how frequently even senior-level federal employees fall for the bogus emails.
Cybersecurity
Chaffetz demands mysteriously deleted OPM breach data
House Oversight and Government Reform Committee digging into a small business tool that may have played a role in uncovering the OPM breach.
Cybersecurity
Streamlined-hiring bill, overarching cyber defense and local IT budgets
News and notes from around the federal IT community.
Cybersecurity
Army CYBERCOM Conducts ‘Experiments,’ While Navy Cyber Fleet Faces 'Real’ Deal
To fight off hackers, nontechies in the branches need training and practic,e too.
Cybersecurity
Agency heads: It takes more tech than you think
Agency heads, acquisition officers and even CIOs don't need to be hard-core techies. FCW's four-part look at the expertise that's really required to make federal IT run.
Cybersecurity
Auditors and regulators: Time to hire more IT grunts?
Agency heads, acquisition officers and even CIOs don't need to be hard-core techies. FCW's four-part look at the expertise that's really required to make federal IT run.
Cybersecurity
150 Solutions to Agencies' Cybersecurity Woes
Competitions are key to finding a fresh batch of cybersecurity talent, says EPA CTO Greg Godbout.
Cybersecurity
Here’s How You Can Find Out if You Were Spied on by the UK and US Governments
Just fill out this simple online form.
Cybersecurity
Federal Inspectors Want to Double-Check How Agencies Fared During ‘Cyber Sprint’
Ground-truthing is partly a way for IGs to maintain a role in information security oversight, now that DHS is in charge.
Cybersecurity
Legacy IT, legacy acquisition compound cyber risk
"We have architectures and hardware and software in places that is indefensible, no matter how much money and talent we put on it," says White House cyber advisor Michael Daniel.
Cybersecurity
How the OPM Hackers Killed the Password
White House directives dating back to 2004 warned against only relying on passwords.
Digital Government