A recent survey finds a number of attributes women seek in their careers can be found in a cybersecurity profession – the dots just need to be connected.By Dawn Kawamoto Associate Editor, Dark Reading, 1/12/20180 comments | Read | Post a Comment
As enterprises move beyond the phase of initial cloud adoption and into hybrid and multicloud environments, the complexity of managing all the moving parts begins to set in. By Emily Johnson Digital Content Editor, InformationWeek, 1/12/20180 comments | Read | Post a Comment
IT groups will need to provide architecture, data-mining tools and connectivity, while giving business groups the freedom to innovate on their own with the Internet of Things. By John Edwards Technology Journalist & Author, 1/11/20180 comments | Read | Post a Comment
Healthcare organizations and the patients they serve have to step up to ensure that medical records and devices are secured from hackers.By Antwanye Ford, President & CEO of Enlightened , 1/11/20180 comments | Read | Post a Comment
Survey finds 'lack of competent in-house staff' outranks all other forms of cybersecurity worry, including data breaches to ransomware attacks.By Dawn Kawamoto Associate Editor, Dark Reading, 1/10/20184 comments | Read | Post a Comment
Developers planning to use public APIs in their software need to consider factors such as what the API provider plans to do with collected data.By Rich Casselberry Risk Technologist, 1/10/20180 comments | Read | Post a Comment
PeopleSoft and WebLogic app servers, as well as cloud systems using WebLogic, hacked and used to net some $226K in digital currency.
By Dawn Kawamoto Associate Editor, Dark Reading, 1/10/20180 comments | Read | Post a Comment
Always a concern, workplace stress has soared to new levels in the tech sector.By Mary Shacklett, founder and owner of Transworld Data , 1/10/20180 comments | Read | Post a Comment
Exclusive interview with Windows Security lead on how 2017 was a "return to retro" security threats and 2018 will bring increasingly targeted, advanced, and dangerous cyberattacks.By Kelly Sheridan Associate Editor, Dark Reading, 1/9/20180 comments | Read | Post a Comment
Windows servers will see biggest degradation, as will Windows 7 and 8 client machines, Microsoft said.By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/9/20180 comments | Read | Post a Comment
It's no longer about just cutting costs. CIOs must figure out ways to monetize tech including data, and where newer systems like blockchain can fit strategically.By Matt Hamblen, technology journalist , 1/9/20180 comments | Read | Post a Comment
Startups and large enterprises can each benefit from working together, but too many partnerships fall apart or never get started.By Alex Goryachev, Senior Director, Cisco , 1/9/20180 comments | Read | Post a Comment
When most people think about innovation, they think of companies like Amazon, Facebook, Apple, and Google because those companies appear to have some kind of magic that other organizations lack. If your company wants to make lightning strike repeatedly, consider these points.By Lisa Morgan Freelance Writer, 1/8/20180 comments | Read | Post a Comment
The recent AWS announcement of single sign-on capabilities has the potential to shake up yet another tech sector.By Ben Kepes , 1/5/20180 comments | Read | Post a Comment
As we move into an age of artificial intelligence tech teams have to strive to eliminate bias in their AI apps.By Martin Fiore and Karyn Twaronite, EY , 1/5/20180 comments | Read | Post a Comment
Apple says all Mac and iOS systems are affected by new side-channel attack vulnerabilities.By Jai Vijayan Freelance writer, 1/4/20180 comments | Read | Post a Comment
Subscription-based IT services aren't just about saving money; they can help secure your data.By Jesper Andersen, CEO, Infoblox , 1/4/20180 comments | Read | Post a Comment
Activity on the cloud adoption front throughout 2017 set the stage for some dramatic changes in how enterprises use the cloud in 2018.By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 1/4/20180 comments | Read | Post a Comment
Researchers release details of 'Meltdown' and 'Spectre' attacks that allow programs to steal sensitive data. By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/3/20185 comments | Read | Post a Comment
As-yet undisclosed design flaw in Intel processors has OS programmers working on kernel updates that reportedly could slow performance.By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/3/20183 comments | Read | Post a Comment
The Dynamics Of The Digital WorkplaceAs companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience.Read >>
Top IT Trends for 2018As we enter a new year of technology planning, find out about the hot technologies organizations are using to advance their businesses and where the experts say IT is heading.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
To save this item to your list of favorite InformationWeek content so you can find it later in your Profile page, click the "Save It" button next to the item.
If you found this interesting or useful, please use the links to the services below to share it with other readers. You will need a free account with each service to share an item via that service.