Articles about Government : US
Zero Day Weekly: Active Microsoft zero-day, Oracle kills Java, D-Link snafu, more DHS cyber-negligence
A collection of notable security news items for the week ending April 17, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
What if we all had the option of voting electronically using a mobile device or personal computer instead of at a poll station?
Your next big privacy threat won't come from the NSA or the FBI. The upcoming presidential campaigns will know a staggering amount about you personally. It's a bit scary and more than a little creepy.
Zero Day Weekly: The curse of Anonabox, Apple eschews Rootpipe, Singtel acquires Trustwave, White House breach follies
A collection of notable security news items for the week ending April 10, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
The faster of the two computers is expected to have a peak performance of 180 petaflops -- which will make it one the world's most powerful computing systems.
DARPA is hoping to do away with software updates as it embarks on a new project to establish a computer system designed to outlive 100 years of technological change.
FBI warns WordPress users to patch their plugins to put a stop to website hacks by ISIS sympathisers.
A former Amazon Marketplace seller has been charged with conspiring with other sellers to fix prices through Amazon.
Zero Day Weekly: Cyber national emergency, GitHub and Slack nailed, Android malware less than 1 percent
A collection of notable security news items for the week ending April 3, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
US declares cybercrime a 'national emergency', threatens sanctions against hackers, online espionage
Sanctions will hit cyber criminals where it hurts - in the pocket, says the White House.
Two agents who were part of the United States government's investigation into the Silk Road online underground marketplace have been charged with allegedly stealing hundreds of thousands of dollars worth of bitcoin.
SEC Chair Mary Jo White posited the new rules provide entrepreneurs with a more "workable path" in raising money and attracting investors.
On the financial side of the spectrum, Yahoo's board also approved a new multi-billion stock buyback program.
Other cloud giants with FedRAMP status handed down by other U.S. Government departments include Microsoft Office 365 and Amazon Web Services.
PayPal allegedly failed to adequately screen its transactions, which included black market trading, violating sanctions by the US government.
You may think you know how scary government can get, but you ain't seen nothin' yet!
Those who want maximum privacy for their email have a tough time using difficult software. Google is attempting to do better with Gmail, but there's already a decent webmail solution.
At informal infosec conference Security B-Sides SF, former Black Hat General Manager and current Global Strategist for Rapid7 Trey Ford outlined the gaps between hacking and legislation in America.
To celebrate President's Day, we look back at some of the technology that defined each of the U.S. presidents from the mid-20th Century, where the Tech Revolution began.
How much do you love your country? Enough to shop until you drop, choosing just the right gifts? If you're stumped on exactly what to give your favorite nation, we have the answers. Come on in!
The government program generally known as Obamacare is the poster child for poor government IT work. There have been others though.
This article is a companion piece to Marines test giant autonomous headless horsebot, published in ZDNet government.
The U.S. government mass surveillance scandal may be the biggest ongoing story of the year. In this updating timeline, you can explore the full scope of the Edward Snowden leaks, which have implicated the world's most powerful nations in the worldwide spying operation.
The most tech-savvy U.S. president to date, Barack Obama uses the best devices and technology for the job, in and outside of the White House. Here's a look at some of the devices, platforms and technology he uses to carry out his day-to-day presidential duties.
Black Hat USA 2013 vendor area included companies such as Veracode, Booz Allen Hamilton and Microsoft, with creative schwag such as Botnets for Breakfast (cereal) and 'hacker' playing cards.
Leading security conference Black Hat 2013 boasts over 100 talks that include hacking nuclear facilities, rooting SIM cards, OPSEC failures of spies, a keynote from the NSA and more.
During his packed Black Hat USA keynote NSA Director Keith Alexander assured the crowd that the NSA's surveillance programs are lawful interception; attendees did not hesitate to shout "Bullshit."
During the year, we have seen the destruction of SOPA and PIPA but the emergence of CISPA and similar laws around the world, a growing trend in hacks and scams, an explosion in malware, and states committing cyberwarfare on their friends and foes. Here's a run-down of what happened in 2012.
With the election only three weeks away, it's becoming clear that I'm going to need to pick a horse to ride really soon. ZDNet Government's David Gewirtz has been finding himself day-dreaming about the people he'd prefer to vote for, if he were given the chance.
In a light-hearted look at the 2012 presidential campaign, Obama and Romney have become the target of many a meme and satirical video.
At the RSA 2011 Conference, Deputy Secretary of Defense William Lynn talks about a new pilot program that will make it easier for government and the technology industry to work together in the future. Lynn says through the new plan, the Defense Department will be able to incorporate more commercial practices while at the same time technology professionals can learn about the challenges facing the Defense Department.
At a Churchill Club event debating the importance of WikiLeaks in Santa Clara, Peter Thiel, Co-founder of Paypal, talks about the difficulty private companies face when defending public interests. Thiel argues that vague laws grant the government excessive powers against companies and individuals and therefore need to be clarified.
At the RSA Conference in San Francisco, FBI Director Robert Mueller highlights the importance of a coordinated response to cybercrime, encouraging businesses to work more closely with the government. Mueller assures companies that reporting breaches of security and going through the investigative process can be done with minimal disruption, safeguarding privacy, data, and confidentiality.
At the RSA Conference in San Francisco, U.S. Secretary of Homeland Security Janet Napolitano discusses three efforts underway to ensure the security of the nation's cyberinfrastructure. This includes the development of National Cybersecurity Incident Response Plan, which will facilitate a coordinated response to cyberthreats from the federal government, local city and state governments, as well as the private sector
At a press event to announce Apps.gov in Mountain View, Calif., ZDNet senior editor Sam Diaz grabs his FlipCam and asks Google co-founder Sergey Brin how tech policy has changed since the Obama administration has entered the political landscape.
At a Churchill Club event held at the Computer History Museum in Menlo Park, Calif., United States CTO Aneesh Chopra describes President Obama's plan to spur innovation through investment, align the nation's domestic priorities, and upgrade the government's own operations.
At Greentech Media's Green Building Summit at SRI International in Menlo Park, Calif., tech executives discuss the future management of smart-grid technology and whether the balance of power will go toward utility companies, government regulatory agencies or building owners.
At Greentech Media’s Green Building Summit at SRI International in Menlo Park, Calif., Serious Material Chairman Marc Porat discusses the challenges associated with building "green" residential homes. He believes it’s important for the green industry to persuade governments to mandate environmentally sustainable buildings in order to speed up construction.
At RSA in San Francisco, Lt. General Keith Alexander talks about how the NSA is working on methods to secure online networks. He outlines two strategies: working with other nations to create an early warning system, and offering strong technical support within the NSA.
At a Churchill Club event in Santa Clara, Calif., Bill Joy, co-founder of Sun Microsystems and partner at Kleiner Perkins Caufield & Byers, calls on the government to require using alternative fuels to protect biofuel innovators from the cyclical nature of the oil market and to make it easier to invest in wind, solar, and geothermal energy.
Teri Takai, the State of California's CIO, talks to CNET's Dan Farber about overseeing an IT organization with more than 130 CIOs and 10,000 technology workers. She also discusses California's e-government initiatives from going green to managing costs during tough economic times.
Teri Takai, CIO of the State of California, describes the State's 'green' strategy. She says the government is looking at ways to decrease its carbon footprint by implementing more services online which would reduce the need for constituents to drive to State offices.
Teri Takai, CIO of the State of California, discusses how she plans to use collaboration and knowledge sharing tools to help communicate with the federal government on various programs such as homeland security, health care and education.