InformationWeek News Connects The Business Technology Community
IoT
IoT
15 Highest-Paying Tech Jobs for 2018
12 Artificial Intelligence Terms You Need to Know
Create Real Value with Augmented (not Artificial) Intelligence
10 Steps Enterprises Need to Take to Comply with GDPR
News & Commentary
What's Next after the SEC 'Insider Trading' Breach?
David L. Axelrod and Terence M. Grugan, Partner, Ballard Spahr
Commentary
Last month's hack of the Security Exchange Commission may prove to be the most high-profile corporate gatekeeper attack to date. But it definitely won't be the last.
By David L. Axelrod and Terence M. Grugan Partner, Ballard Spahr, 10/19/2017
Comment0 comments  |  Read  |  Post a Comment
Management Tools Bring Structure to Multi-Cloud Environments
John Edwards, Technology Journalist & Author
Satire
New tools help enterprises organize and maximize their expanding multiple cloud infrastructure.
By John Edwards Technology Journalist & Author, 10/19/2017
Comment0 comments  |  Read  |  Post a Comment
BI Will Change the Role of IT as We Know It
Guest Commentary, Guest Commentary
Commentary
IT’s role within an organization has always been a critical one, but the advancement of business intelligence and data analytics will make IT exponentially more strategic.
By Bobby Beckmann, CTO, Lifesize , 10/19/2017
Comment0 comments  |  Read  |  Post a Comment
Oracle Fixes 20 Remotely Exploitable Java SE Vulns
Jai Vijayan, Freelance writer
News
Quarterly update for October is the smallest of the year: only 252 flaws to fix! Oracle advises to apply patches 'without delay.'
By Jai Vijayan Freelance writer, 10/18/2017
Comment0 comments  |  Read  |  Post a Comment
The First Rule of Data: Do No Harm
Emily Johnson, Digital Content Editor, InformationWeek
News
At the Strata Big Data Conference in New York, one of the major themes was the responsibility that data scientists have to do their best to prevent the biases and prejudices that exist in society from creeping into data and the way algorithms are built.
By Emily Johnson Digital Content Editor, InformationWeek, 10/18/2017
Comment0 comments  |  Read  |  Post a Comment
DevOps Fails More Often Than Not – Here’s Why
Guest Commentary, Guest Commentary
Commentary
DevOps presents an opportunity to build better software, but there's no guarantee of success. A look at how to do DevOps right.
By Mark Tomcza, Global DevOps Solutions Architect, Electric Cloud , 10/18/2017
Comment0 comments  |  Read  |  Post a Comment
InfoSec Pros Among Worst Offenders of Employer Snooping
Dawn Kawamoto, Associate Editor, Dark Reading
News
A majority of IT security professionals admit to trolling through company information unrelated to their work -- even sensitive material.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/17/2017
Comment1 Comment  |  Read  |  Post a Comment
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLink
Commentary
The left side of the brain is logical and linear; the right side, creative. You have to use both sides of the brain to connect to your audience in your business.
By Bill Bradley SVP, Cyber Engineering and Technical Services, CenturyLink, 10/17/2017
Comment2 comments  |  Read  |  Post a Comment
15 Highest-Paying Tech Jobs for 2018
Cynthia Harvey, Contributor, NetworkComputing
News
Executives, managers, mobile developers and people with the word "architect" in their title are at the top of the IT pay scale.
By Cynthia Harvey Contributor, NetworkComputing, 10/17/2017
Comment0 comments  |  Read  |  Post a Comment
Create Real Value with Augmented (not Artificial) Intelligence
Guest Commentary, Guest Commentary
Commentary
As long as human and artificial intelligence work in tandem, we’ll continue to make each other better at what we naturally do best.
By David Rosen, Digital Transformation Technologist and Strategist, Tibco , 10/17/2017
Comment0 comments  |  Read  |  Post a Comment
DHS to Require All Fed Agencies to Use DMARC, HTTPS, and STARTTLS
Dawn Kawamoto, Associate Editor, Dark Reading
News
The move follows a DHS review of federal government agencies' steps to secure email and deploy authentication technologies.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
New Cybercrime Campaign a 'Clear and Imminent' Threat to Banks Worldwide
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Hundreds of millions of dollars stolen from banks via an sophisticated attack that blended cyber and physical elements.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
GDPR Compliance: 5 Early Steps to Get Laggards Going
Sara Peters, Senior Editor at Dark Reading
News
If you're just getting on the EU General Data Protection Regulation bandwagon, here's where you should begin.
By Sara Peters Senior Editor at Dark Reading, 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
Growing Soft Skills for Better IT Business Relationships
Emily Johnson, Digital Content Editor, InformationWeek
CommentaryVideo
KBG Consulting's Kathryn Brett Goldman shares the value of building soft skills in the IT department at the InformationWeek News Desk at Interop ITX.
By Emily Johnson Digital Content Editor, InformationWeek, 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
3 Ways You're Not Thinking of Digital Transformation
Guest Commentary, Guest Commentary
Commentary
To achieve the benefits of digital transformation, an organization has to do more than buy new technology tools.
By Sunny Bajaj, CEO and Founder of DMI , 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
Azure Stack and Comparisons with Eucalyptus
Ben Kepes,
News
Microsoft's Azure Stack is another cloud provider move to validate the hybrid cloud.But will it succeed?
By Ben Kepes , 10/13/2017
Comment0 comments  |  Read  |  Post a Comment
10 Major Cloud Storage Security Slip-Ups (So Far) this Year
Kelly Sheridan, Associate Editor, Dark Reading
News
Accenture is the latest in a string of major companies to expose sensitive cloud data this year, following Verizon, Deloitte, and Dow Jones.
By Kelly Sheridan Associate Editor, Dark Reading, 10/13/2017
Comment1 Comment  |  Read  |  Post a Comment
Kaspersky Lab and the AV Security Hole
Jai Vijayan, Freelance writer
News
It's unclear what happened in the reported theft of NSA data by Russian spies, but an attacker would need little help to steal if he or she had privileged access to an AV vendor's network, security experts say.
By Jai Vijayan Freelance writer, 10/12/2017
Comment1 Comment  |  Read  |  Post a Comment
Security No. 1 Inhibitor to Microsoft Office 365 Adoption
Kelly Sheridan, Associate Editor, Dark Reading
News
More businesses are switching to Office 365 despite fear of social engineering and ransomware attacks, but some remain wary.
By Kelly Sheridan Associate Editor, Dark Reading, 10/12/2017
Comment0 comments  |  Read  |  Post a Comment
Survey: Show Enterprise Architecture More Love
Johanna Ambrosio, Tech Journalist
News
EA planning helps link IT with business users, especially for digital transformation projects, according to a recent CompTIA survey.
By Johanna Ambrosio Tech Journalist, 10/12/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Commentary
Tips for Transitioning from the IT Department to CEO Chair
Guest Commentary, Guest Commentary,  10/12/2017
Commentary
Your Data Is Biased, Here's Why
Lisa Morgan, Freelance Writer,  10/11/2017
Commentary
Our Coming 5G World and IoT
Guest Commentary, Guest Commentary,  10/10/2017
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
The Dynamics Of The Digital Workplace
As companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience. Read >>
Partner Perspectives
What's This??
Partner Perspectives
What's This?
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
[Interop ITX 2017] State Of DevOps Report
[Interop ITX 2017] State Of DevOps Report
The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
Video
Sponsored Video
Slideshows
Twitter Feed
Flash Poll