Amazon subsidiary will build cloud data center.
Amazon subsidiary will build cloud data center.
Notable security news items for the week ending November 20, 2015. Covers enterprise, application and mobile security, reports and more.
Survey finds the vast majority of U.S. federal IT managers feel their systems are not capable of meeting the challenges ahead.
The FBI's chief security information officer discusses shares intel about the cloud security infrastructure for the largest law enforcement organization in the United States.
The accusation that the FBI paid university researchers $1m to break the anonymous browsing service is "inaccurate" -- but which part, exactly?
The TPP has put suppliers from each of the 12 member states on equal footing when applying for government procurement contracts.
Short-term projects are taking priority at many organizations as the trend toward agile IT spreads throughout the enterprise.
The full text of the TPP has revealed that it is simply encouraging member states to promote more reasonable costs for global roaming, rather than regulating the pricing.
The full text of the TPP ties in with WikiLeaks' leaked document last month, stating that ISPs must hand over copyright infringer details to rights holders when legally compelled.
It is not possible to find Dotcom guilty of wire fraud under the legal definitions of both the US and NZ, with the extradition treaty also not covering copyright infringement, according to his lawyers.
Dotcom has accused the US of wilfully mistranslating him and of trying to twist the New Zealand legal definition of copyright infringement to mean fraud.
Notable security news items for the week ending October 23, 2015. Covers enterprise, application and mobile security, reports and more.
CIA director John Brennan reportedly used his AOL account to store possibly classified -- or, at very least, sensitive -- materials.
An American cloud security company has alleged that Chinese actors are still attempting to break into US companies.
The game of drones takes a new turn, suggesting not all unmanned aircraft will have clear takeoffs to the friendly skies soon.
The EMV deadline has come and gone in the United States, but the debate over how the standard is being implemented is still a hotly contested issue.
America's big information security conference comes into its 18th year with standing room only talks and a big-money expo, but still can't hire hackers fast enough to match industry growth.
With the 2016 Presidential election season right around the corner, 16 Republican hopefuls have launched their campaigns, and their Web sites. In this gallery, ZDNet's David Gewirtz explores the candidates sites (and their chances).
You may think you know how scary government can get, but you ain't seen nothin' yet!
Those who want maximum privacy for their email have a tough time using difficult software. Google is attempting to do better with Gmail, but there's already a decent webmail solution.
At informal infosec conference Security B-Sides SF, former Black Hat General Manager and current Global Strategist for Rapid7 Trey Ford outlined the gaps between hacking and legislation in America.
To celebrate President's Day, we look back at some of the technology that defined each of the U.S. presidents from the mid-20th Century, where the Tech Revolution began.
How much do you love your country? Enough to shop until you drop, choosing just the right gifts? If you're stumped on exactly what to give your favorite nation, we have the answers. Come on in!
The government program generally known as Obamacare is the poster child for poor government IT work. There have been others though.
This article is a companion piece to Marines test giant autonomous headless horsebot, published in ZDNet government.
The U.S. government mass surveillance scandal may be the biggest ongoing story of the year. In this updating timeline, you can explore the full scope of the Edward Snowden leaks, which have implicated the world's most powerful nations in the worldwide spying operation.
The most tech-savvy U.S. president to date, Barack Obama uses the best devices and technology for the job, in and outside of the White House. Here's a look at some of the devices, platforms and technology he uses to carry out his day-to-day presidential duties.
Black Hat USA 2013 vendor area included companies such as Veracode, Booz Allen Hamilton and Microsoft, with creative schwag such as Botnets for Breakfast (cereal) and 'hacker' playing cards.
Leading security conference Black Hat 2013 boasts over 100 talks that include hacking nuclear facilities, rooting SIM cards, OPSEC failures of spies, a keynote from the NSA and more.
During his packed Black Hat USA keynote NSA Director Keith Alexander assured the crowd that the NSA's surveillance programs are lawful interception; attendees did not hesitate to shout "Bullshit."
During the year, we have seen the destruction of SOPA and PIPA but the emergence of CISPA and similar laws around the world, a growing trend in hacks and scams, an explosion in malware, and states committing cyberwarfare on their friends and foes. Here's a run-down of what happened in 2012.
At the RSA 2011 Conference, Deputy Secretary of Defense William Lynn talks about a new pilot program that will make it easier for government and the technology industry to work together in the future. Lynn says through the new plan, the Defense Department will be able to incorporate more commercial practices while at the same time technology professionals can learn about the challenges facing the Defense Department.
At a Churchill Club event debating the importance of WikiLeaks in Santa Clara, Peter Thiel, Co-founder of Paypal, talks about the difficulty private companies face when defending public interests. Thiel argues that vague laws grant the government excessive powers against companies and individuals and therefore need to be clarified.
At the RSA Conference in San Francisco, FBI Director Robert Mueller highlights the importance of a coordinated response to cybercrime, encouraging businesses to work more closely with the government. Mueller assures companies that reporting breaches of security and going through the investigative process can be done with minimal disruption, safeguarding privacy, data, and confidentiality.
At the RSA Conference in San Francisco, U.S. Secretary of Homeland Security Janet Napolitano discusses three efforts underway to ensure the security of the nation's cyberinfrastructure. This includes the development of National Cybersecurity Incident Response Plan, which will facilitate a coordinated response to cyberthreats from the federal government, local city and state governments, as well as the private sector
At a press event to announce Apps.gov in Mountain View, Calif., ZDNet senior editor Sam Diaz grabs his FlipCam and asks Google co-founder Sergey Brin how tech policy has changed since the Obama administration has entered the political landscape.
At a Churchill Club event held at the Computer History Museum in Menlo Park, Calif., United States CTO Aneesh Chopra describes President Obama's plan to spur innovation through investment, align the nation's domestic priorities, and upgrade the government's own operations.
At Greentech Media's Green Building Summit at SRI International in Menlo Park, Calif., tech executives discuss the future management of smart-grid technology and whether the balance of power will go toward utility companies, government regulatory agencies or building owners.
At Greentech Media’s Green Building Summit at SRI International in Menlo Park, Calif., Serious Material Chairman Marc Porat discusses the challenges associated with building "green" residential homes. He believes it’s important for the green industry to persuade governments to mandate environmentally sustainable buildings in order to speed up construction.
At RSA in San Francisco, Lt. General Keith Alexander talks about how the NSA is working on methods to secure online networks. He outlines two strategies: working with other nations to create an early warning system, and offering strong technical support within the NSA.
At a Churchill Club event in Santa Clara, Calif., Bill Joy, co-founder of Sun Microsystems and partner at Kleiner Perkins Caufield & Byers, calls on the government to require using alternative fuels to protect biofuel innovators from the cyclical nature of the oil market and to make it easier to invest in wind, solar, and geothermal energy.
Teri Takai, the State of California's CIO, talks to CNET's Dan Farber about overseeing an IT organization with more than 130 CIOs and 10,000 technology workers. She also discusses California's e-government initiatives from going green to managing costs during tough economic times.
Teri Takai, CIO of the State of California, describes the State's 'green' strategy. She says the government is looking at ways to decrease its carbon footprint by implementing more services online which would reduce the need for constituents to drive to State offices.
Teri Takai, CIO of the State of California, discusses how she plans to use collaboration and knowledge sharing tools to help communicate with the federal government on various programs such as homeland security, health care and education.