InformationWeek News Connects The Business Technology Community
IoT
IoT
12 Artificial Intelligence Terms You Need to Know
10 Steps Enterprises Need to Take to Comply with GDPR
Artificial Intelligence Today: Time to Act
While AWS and VMware Draw Closer, Amazon Still Looks to Dominate
News & Commentary
Azure Stack and Comparisons with Eucalyptus
Ben Kepes,
News
Microsoft's Azure Stack is another cloud provider move to validate the hybrid cloud.But will it succeed?
By Ben Kepes , 10/13/2017
Comment0 comments  |  Read  |  Post a Comment
10 Major Cloud Storage Security Slip-Ups (So Far) this Year
Kelly Sheridan, Associate Editor, Dark Reading
News
Accenture is the latest in a string of major companies to expose sensitive cloud data this year, following Verizon, Deloitte, and Dow Jones.
By Kelly Sheridan Associate Editor, Dark Reading, 10/13/2017
Comment0 comments  |  Read  |  Post a Comment
Kaspersky Lab and the AV Security Hole
Jai Vijayan, Freelance writer
News
It's unclear what happened in the reported theft of NSA data by Russian spies, but an attacker would need little help to steal if he or she had privileged access to an AV vendor's network, security experts say.
By Jai Vijayan Freelance writer, 10/12/2017
Comment2 comments  |  Read  |  Post a Comment
Security No. 1 Inhibitor to Microsoft Office 365 Adoption
Kelly Sheridan, Associate Editor, Dark Reading
News
More businesses are switching to Office 365 despite fear of social engineering and ransomware attacks, but some remain wary.
By Kelly Sheridan Associate Editor, Dark Reading, 10/12/2017
Comment0 comments  |  Read  |  Post a Comment
Survey: Show Enterprise Architecture More Love
Johanna Ambrosio, Tech Journalist
News
EA planning helps link IT with business users, especially for digital transformation projects, according to a recent CompTIA survey.
By Johanna Ambrosio Tech Journalist, 10/12/2017
Comment0 comments  |  Read  |  Post a Comment
Olympic Games Face Greater Cybersecurity Risks
Dawn Kawamoto, Associate Editor, Dark Reading
News
Cybercriminals may alter score results and engage in launching physical attacks at future Olympic Games, a recently released report warns.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/12/2017
Comment0 comments  |  Read  |  Post a Comment
Ransomware Grabs Headlines but BEC May Be a Bigger Threat
Marc Wilczek, Digital Strategist & CIO Advisor
Commentary
With social media, gathering information has never been easier, making Business Email Compromise the land of milk and honey for cybercriminals.
By Marc Wilczek Digital Strategist & CIO Advisor, 10/12/2017
Comment0 comments  |  Read  |  Post a Comment
Tips for Transitioning from the IT Department to CEO Chair
Guest Commentary, Guest Commentary
Commentary
Prevedere CEO Rich Wagner takes a look at the skills that IT leaders share and what they might need to work on to move into a CEO role.
By Rich Wagner, president and CEO, Prevedere , 10/12/2017
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity's 'Broken' Hiring Process
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
New study shows the majority of cybersecurity positions get filled at salaries above the original compensation cap, while jobs sit unfilled an average of six months.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/11/2017
Comment4 comments  |  Read  |  Post a Comment
What Makes Digital Projects Different (And What to Do About It)
Guest Commentary, Guest Commentary
Commentary
With 77% of executive priorities now dependent on technology, the composition of the project portfolio is shifting dramatically toward digital work. Legacy approaches to managing IT projects, programs and portfolios can’t keep up with this shift.
By Matt McWha and Veena Variyam, CEB (Now Gartner) , 10/11/2017
Comment2 comments  |  Read  |  Post a Comment
New Dark Reading Conference Will Focus on Defense
Dark Reading Staff,
Commentary
The INsecurity Conference, Nov. 29-30 at the Gaylord National Harbor in Maryland is all about helping infosecurity pros mitigate threats -- from hot topics to basic hygiene.
By Dark Reading Staff , 10/11/2017
Comment0 comments  |  Read  |  Post a Comment
10 Steps Enterprises Need to Take to Comply with GDPR
Cynthia Harvey, Contributor, NetworkComputing
News
If your organization doesn’t have adequate data protection measures in place, including assigning a data protection officer, you could face steep fines next May.
By Cynthia Harvey Contributor, NetworkComputing, 10/11/2017
Comment0 comments  |  Read  |  Post a Comment
GDPR Concerns Include 'Where's My Data Stored?'
Ericka Chickowski, Contributing Writer, Dark Reading
News
European data protection regulations are coming like a freight train and many firms are still unprepared.
By Ericka Chickowski Contributing Writer, Dark Reading, 10/11/2017
Comment0 comments  |  Read  |  Post a Comment
Your Data Is Biased, Here's Why
Lisa Morgan, Freelance Writer
Commentary
Biased data can lead to bad decisions. Most business leaders aren't aware of the problem just yet, but they need to be because they're ultimately responsible.
By Lisa Morgan Freelance Writer, 10/11/2017
Comment1 Comment  |  Read  |  Post a Comment
Our Coming 5G World and IoT
Guest Commentary, Guest Commentary
Commentary
The future of IoT and 5G networking isn’t something that “will happen” in the coming years. To some extent, it’s already here, setting the stage for further growth.
By Richard Adler, distinguished fellow, Institute for the Future , 10/10/2017
Comment0 comments  |  Read  |  Post a Comment
AIM Was a Pioneer in Collaboration
James M. Connolly, Executive Managing Editor, InformationWeekEditor in Chief
News
Now 20 years old, AOL Instant Messenger is quietly heading to software's trash heap.
By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 10/10/2017
Comment2 comments  |  Read  |  Post a Comment
The Programmable Infrastructure
Emily Johnson, Digital Content Editor, InformationWeek
SatireVideo
Interop ITX 2017 keynoter, Susie Wee, VP and CTO of DevNet Innovations for Cisco, sat down with us at the InformationWeek News Desk to talk about the intersection of applications and infrastructure.
By Emily Johnson Digital Content Editor, InformationWeek, 10/10/2017
Comment1 Comment  |  Read  |  Post a Comment
Key New Security Features in Android Oreo
Dawn Kawamoto, Associate Editor, Dark Reading
News
Android 8.0 Oreo marks a major revamp of Google's mobile operating system, putting in a number of new security-hardening measures.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/10/2017
Comment0 comments  |  Read  |  Post a Comment
While AWS and VMware Draw Closer, Amazon Still Looks to Dominate
Ben Kepes,
News
AWS and VMware now are partners but it might be only a matter of time before AWS moves to take its own path.
By Ben Kepes , 10/9/2017
Comment0 comments  |  Read  |  Post a Comment
Russian Hackers Targeted NSA Employee's Home Computer
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
New reports today say it was a National Security Agency employee, not a a contractor, whose home machine running Kaspersky Lab antivirus was hacked for classified files.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/6/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Commentary
Tips for Transitioning from the IT Department to CEO Chair
Guest Commentary, Guest Commentary,  10/12/2017
Commentary
Your Data Is Biased, Here's Why
Lisa Morgan, Freelance Writer,  10/11/2017
Commentary
Our Coming 5G World and IoT
Guest Commentary, Guest Commentary,  10/10/2017
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
The Dynamics Of The Digital Workplace
As companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience. Read >>
Partner Perspectives
What's This??
Partner Perspectives
What's This?
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
[Interop ITX 2017] State Of DevOps Report
[Interop ITX 2017] State Of DevOps Report
The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
Video
Sponsored Video
Slideshows
Twitter Feed
Flash Poll