Mobile banking Trojan BankBot uses a unique payload downloading technique to skip past Google Play Protect.By Dawn Kawamoto Associate Editor, Dark Reading, 11/27/20170 comments | Read | Post a Comment
Don't build custom software for general purpose computing needs that are better served by third party applications.By Robert Reeves, co-founder and CTO, Datical , 11/27/20170 comments | Read | Post a Comment
Docker's embrace of Kubernetes in the enterprise might make you wonder how Docker will find new growth paths.By Ben Kepes , 11/27/20170 comments | Read | Post a Comment
HR analytics aren't mainstream yet, but they're gaining traction because human capital management is a competitive issue. From recruiting to employee performance and overall HR operations, analytics will have an increasing impact on companies and individuals.By Lisa Morgan Freelance Writer, 11/26/20170 comments | Read | Post a Comment
The cost of protecting applications from cyberattacks is climbing fast. So, it's time for business units to help cover the pricetag.By Amit Ashbel, Cybersecurity evangelist, Checkmarx , 11/22/20170 comments | Read | Post a Comment
If companies are forward-thinking in their application of predictive analytics, AI, and machine learning they can make these technologies inclusive, and available and relevant to all people.By Steven Aldrich, Chief Product Officer at GoDaddy, and Bärí A. Williams, Associate General Counsel at Marqeta , 11/21/20170 comments | Read | Post a Comment
Change is never easy, particularly in an age of constant change. So, consider new ways to implement change and smooth the process.By Andrew Horne IT Practice Leader, CEB, now Gartner, 11/21/20170 comments | Read | Post a Comment
As the mega-shopping day approaches, here's a look at six examples of phishing attacks - and ways to avoid taking the bait.By Dawn Kawamoto Associate Editor, Dark Reading, 11/21/20171 Comment | Read | Post a Comment
Real-world DevOps implementers highlight how varied organizations discovered benefits from DevOps, even if they had to clear some hurdles on the path to success.By Tony Kontzer , 11/21/20170 comments | Read | Post a Comment
Good intentions alone don't make for a successful hackathon. Here are some lessons learned at Adobe.By David Parmenter, Director of Data and Engineering, Adobe , 11/21/20170 comments | Read | Post a Comment
Are you ready to take the leap into an analytics career? Here are some keys to getting started.By Jen Underwood Impact Analytix, 11/20/20170 comments | Read | Post a Comment
The Amazon experience isn't just for consumer-facing applications. Imagine what it can do for a traditional company.By Ben Kepes , 11/20/20170 comments | Read | Post a Comment
Attempted malware infections against BYOD and corporate mobile devices are expected to continue to grow, new data shows.By Dawn Kawamoto Associate Editor, Dark Reading, 11/17/20175 comments | Read | Post a Comment
If you want build trust in machine learning, try treating it like a human, asking it the same type of questions.By Colin Priest, Director of Customer Success, DataRobot , 11/17/20170 comments | Read | Post a Comment
Say goodbye to the entry-level security operations center (SOC) analyst as we know it. By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/16/20171 Comment | Read | Post a Comment
When enterprise IT teams transition to a DevOps approach, they often face difficult organizational and cultural challenges.By Cynthia Harvey Contributor, NetworkComputing, 11/16/20170 comments | Read | Post a Comment
Cybersecurity doesn’t have to be just a cost of doing business. With the right approach, it can both protect while creating new levels of business growth.By Jim Poole, Vice President for Global Ecosystem Development, Equinix , 11/16/20170 comments | Read | Post a Comment
Eight apps found infected with a new Trojan family that ups the ante in obfuscation with four payload stages.By Dawn Kawamoto Associate Editor, Dark Reading, 11/15/20171 Comment | Read | Post a Comment
By their very nature, antiquated, static identifiers like Social Security numbers and dates of birth are worse than passwords.By Seth Ruden Senior Fraud Consultant, ACI Worldwide, 11/15/20170 comments | Read | Post a Comment
How one organization is using a data prep tool to combat human trafficking and slavery. By Emily Johnson Digital Content Editor, InformationWeek, 11/15/20170 comments | Read | Post a Comment
The Dynamics Of The Digital WorkplaceAs companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience.Read >>
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
To save this item to your list of favorite InformationWeek content so you can find it later in your Profile page, click the "Save It" button next to the item.
If you found this interesting or useful, please use the links to the services below to share it with other readers. You will need a free account with each service to share an item via that service.