Microsoft's Azure Stack is another cloud provider move to validate the hybrid cloud.But will it succeed?By Ben Kepes , 10/13/20170 comments | Read | Post a Comment
Accenture is the latest in a string of major companies to expose sensitive cloud data this year, following Verizon, Deloitte, and Dow Jones.By Kelly Sheridan Associate Editor, Dark Reading, 10/13/20170 comments | Read | Post a Comment
It's unclear what happened in the reported theft of NSA data by Russian spies, but an attacker would need little help to steal if he or she had privileged access to an AV vendor's network, security experts say.By Jai Vijayan Freelance writer, 10/12/20172 comments | Read | Post a Comment
More businesses are switching to Office 365 despite fear of social engineering and ransomware attacks, but some remain wary.By Kelly Sheridan Associate Editor, Dark Reading, 10/12/20170 comments | Read | Post a Comment
EA planning helps link IT with business users, especially for digital transformation projects, according to a recent CompTIA survey.By Johanna Ambrosio Tech Journalist, 10/12/20170 comments | Read | Post a Comment
Cybercriminals may alter score results and engage in launching physical attacks at future Olympic Games, a recently released report warns.By Dawn Kawamoto Associate Editor, Dark Reading, 10/12/20170 comments | Read | Post a Comment
With social media, gathering information has never been easier, making Business Email Compromise the land of milk and honey for cybercriminals.By Marc Wilczek Digital Strategist & CIO Advisor, 10/12/20170 comments | Read | Post a Comment
Prevedere CEO Rich Wagner takes a look at the skills that IT leaders share and what they might need to work on to move into a CEO role.By Rich Wagner, president and CEO, Prevedere , 10/12/20170 comments | Read | Post a Comment
New study shows the majority of cybersecurity positions get filled at salaries above the original compensation cap, while jobs sit unfilled an average of six months. By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/11/20174 comments | Read | Post a Comment
With 77% of executive priorities now dependent on technology, the composition of the project portfolio is shifting dramatically toward digital work. Legacy approaches to managing IT projects, programs and portfolios can’t keep up with this shift.By Matt McWha and Veena Variyam, CEB (Now Gartner) , 10/11/20172 comments | Read | Post a Comment
The INsecurity Conference, Nov. 29-30 at the Gaylord National Harbor in Maryland is all about helping infosecurity pros mitigate threats -- from hot topics to basic hygiene.By Dark Reading Staff , 10/11/20170 comments | Read | Post a Comment
If your organization doesn’t have adequate data protection measures in place, including assigning a data protection officer, you could face steep fines next May.By Cynthia Harvey Contributor, NetworkComputing, 10/11/20170 comments | Read | Post a Comment
European data protection regulations are coming like a freight train and many firms are still unprepared.
By Ericka Chickowski Contributing Writer, Dark Reading, 10/11/20170 comments | Read | Post a Comment
Biased data can lead to bad decisions. Most business leaders aren't aware of the problem just yet, but they need to be because they're ultimately responsible.By Lisa Morgan Freelance Writer, 10/11/20171 Comment | Read | Post a Comment
The future of IoT and 5G networking isn’t something that “will happen” in the coming years. To some extent, it’s already here, setting the stage for further growth. By Richard Adler, distinguished fellow, Institute for the Future , 10/10/20170 comments | Read | Post a Comment
Now 20 years old, AOL Instant Messenger is quietly heading to software's trash heap.By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 10/10/20172 comments | Read | Post a Comment
Interop ITX 2017 keynoter, Susie Wee, VP and CTO of DevNet Innovations for Cisco, sat down with us at the InformationWeek News Desk to talk about the intersection of applications and infrastructure. By Emily Johnson Digital Content Editor, InformationWeek, 10/10/20171 Comment | Read | Post a Comment
Android 8.0 Oreo marks a major revamp of Google's mobile operating system, putting in a number of new security-hardening measures.By Dawn Kawamoto Associate Editor, Dark Reading, 10/10/20170 comments | Read | Post a Comment
AWS and VMware now are partners but it might be only a matter of time before AWS moves to take its own path.By Ben Kepes , 10/9/20170 comments | Read | Post a Comment
New reports today say it was a National Security Agency employee, not a a contractor, whose home machine running Kaspersky Lab antivirus was hacked for classified files. By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/6/20170 comments | Read | Post a Comment
The Dynamics Of The Digital WorkplaceAs companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience.Read >>
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
[Interop ITX 2017] State Of DevOps ReportThe DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
To save this item to your list of favorite InformationWeek content so you can find it later in your Profile page, click the "Save It" button next to the item.
If you found this interesting or useful, please use the links to the services below to share it with other readers. You will need a free account with each service to share an item via that service.