Security

There's a folk-story that all Japanese schoolchildren learn about an old man who lives in a village by the sea. One day, an earthquake hits. He's the only person in the village to realize that a tsunami will soon follow. He hurries to the nearby mountainside where the rice for the village is grown a...

GOVERNMENT IT REPORT

US Pushes Cybersecurity Acquisition Tools as Contracts Flow

Vendors of cybersecurity offerings are finding that the U.S. government is serious about improving the protection of federal IT assets. A steady stream of data protection contracts has been flowing to providers, including some notable high-value transactions during the last half of 2016. One example...

Evernote Toes the Privacy Line

Caught off guard by a huge backlash, Evernote recently abandoned its plan to let staffers read customer notes under certain circumstances. The plan, which was scheduled to go into effect in January, would have allowed staffers to review private customer notes as a means of assessing the accuracy of ...

China's parliament earlier this month passed a law aimed at addressing the country's concerns about hacking and terrorism, which has spiked concerns among foreign businesses and human rights advocates. One interpretation of the new law is that it only codifies China's existing cybersecurity practice...

GOVERNMENT IT REPORT

Feds Need to Bolster Cyberprotection Speed and Range

Providing cybersecurity adequate to meet increasing threats is a perpetual catch-up process. Public sector agencies are particularly sensitive targets, with high visibility not only to the citizens they serve, but also to cyberattackers. Despite the emphasis on cyberprotection spurred by the major ...

GOVERNMENT IT REPORT

Commerce Dept Signs Up Private Sector IT Partners

The U.S. Commerce Department recently launched a new effort to jump-start more efficient ways to manage the vast amounts of data that reside within the federal government and put it to productive use. The National Technical Information Service, a unit within the department, is leading the effort. NT...

The United States Federal Communications Commission last week adopted privacy rules for both wired and wireless broadband ISPs aimed at giving consumers greater control over their data, more privacy, and stronger security safeguards for that data. The rules implement Section 222 of the Communication...

Verizon last week indicated that its $4.8 billion acquisition of Yahoo could be in jeopardy in light of its delay in disclosing a massive 2014 data breach that compromised about 500 million account holders. Verizon may need some additional assurances about the effects of the breach, suggested Genera...

Symantec on Tuesday reported on a malware campaign that has targeted financial organizations worldwide for the past 10 months. Dubbed "Trojan.Odinaff," it has infiltrated the banking, securities, trading and payroll sectors, as well as organizations that provide them with support services. Odinaff i...

Backpage CEO Carl Ferrer is facing extradition to California on charges his company earned millions of dollars by promoting adult and child prostitution through escort advertisements run on the site. Ferrer's arrest took place in Houston upon his return from the Netherlands to the headquarters of hi...

Newsweek is the latest media institution to get caught up in a series of cyberattacks that have targeted major government, political and media organizations, raising suspicions of links to Russia. The news magazine sustained a massive DDoS attack the day after it published a cover story about Republ...

GOVERNMENT IT REPORT

US Launches IT Contract to Spur Cybersecurity Purchases

The U.S. government plans to initiate an updated contracting vehicle for the acquisition of cybersecurity information technologies for federal agencies this month. The purpose of the program is to make it easier and more efficient for federal agencies to obtain cyberprotection services. Specifically...

Apple last week faced renewed scrutiny for its data-sharing practices, following a report that it retains iMessage metadata and shares it with law enforcement when presented with a court order. The company for months has insisted that it would not share data that would jeopardize the privacy and tr...

E-Commerce Times Channels