Cybersecurity

'We don't have a way to code good guy'

A "magical rainbow unicorn key" for encrypted devices may be what law enforcement wants, but such access could mean bad actors would also have access to data, privacy activists argue.

Modernization

Massive Security Breach Hits Apple’s App Store in China

Chinese users who download some of the nation’s most popular apps could find their personal information extracted by hackers, security experts say.

Cybersecurity

Hacker Cons Virtual Currency Processor Bitpay Out of $1.8M

Financial Services // Web Services // Georgia, United States

Cybersecurity

N.C. School District Leaks Details on Potential Hires

Education // North Carolina, United States

Cybersecurity

If You Fall for a Phishing Scam, Should You Lose Your Security Clearance?

CISOs are concerned about how frequently even senior-level federal employees fall for the bogus emails.

Cybersecurity

Chaffetz demands mysteriously deleted OPM breach data

House Oversight and Government Reform Committee digging into a small business tool that may have played a role in uncovering the OPM breach.

Cybersecurity

Agency heads: It takes more tech than you think

Agency heads, acquisition officers and even CIOs don't need to be hard-core techies. FCW's four-part look at the expertise that's really required to make federal IT run.

Cybersecurity

Auditors and regulators: Time to hire more IT grunts?

Agency heads, acquisition officers and even CIOs don't need to be hard-core techies. FCW's four-part look at the expertise that's really required to make federal IT run.

Cybersecurity

150 Solutions to Agencies' Cybersecurity Woes

Competitions are key to finding a fresh batch of cybersecurity talent, says EPA CTO Greg Godbout.

Cybersecurity

Federal Inspectors Want to Double-Check How Agencies Fared During ‘Cyber Sprint’

Ground-truthing is partly a way for IGs to maintain a role in information security oversight, now that DHS is in charge.

Cybersecurity

Legacy IT, legacy acquisition compound cyber risk

"We have architectures and hardware and software in places that is indefensible, no matter how much money and talent we put on it," says White House cyber advisor Michael Daniel.

Cybersecurity

How the OPM Hackers Killed the Password

White House directives dating back to 2004 warned against only relying on passwords.