Articles about Government : US
The agency says restructuring will bring it to the digital forefront -- and digital intelligence gathering is now critical.
A collection of notable security news items for the week ending March 6, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
The media creates mythology. David Gewirtz looks at how the AP created a new, completely false Hillary Clinton myth about a fake identity, how it's sticking, and where it all went wrong.
Did she do anything wrong? Were federal record-keeping laws broken? Was security compromised? Email expert and presidential scholar David Gewirtz deconstructs Hillary Clinton's emailgate.
One of the two commissioners of the US Federal Communications Commission who voted against the FCC's decision in favour of net neutrality has said that the fight is a long way from being over.
Intelligence agencies do more than just spy on you in the cloud. Some, like the CIA, use the cloud for their own purposes.
The nation's two largest telco companies get personal -- and downright childish -- following the FCC's Net Neutrality decision.
With Congress washing its hands of the matter, the FCC voted to regulate Internet Service Providers as utilities.
SIM card maker was targeted by security services but insists they only breached its office network.
Zero Day Weekly: Lenovo's poison Superfish, Netgear vuln, SIM card spying, Obama's encryption follies
A collection of notable security news items for the week ending February 20, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Head of identity ecosystem initiative helped drive $30 million in pilot project funding
The White House is stacking up on Silicon Valley heavyweights as it wrangles its cyber data and security policies.
A collection of notable security news items for the week ending February 13, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
The Obama administration believes new regulations set for foreign companies in China represent a "major barrier" to trade.
Facebook's ThreatExchange, a social platform designed to enable cyberattack data sharing, is the latest example of how companies and government agencies are trying to aggregate intelligence.
After a recent trip to Lebanon, CNET's Esther Dyson stresses the importance of being sensitive to local cultures and customs when expanding globally. She tells ZDNet's Dan Farber which companies she thinks are doing a good job and explains what international governments should do to secure U.S. investment.