InformationWeek, serving the information needs of the Business Technology Community

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Making Developers More DevSecOps Aware
Citizen Developers: 8 Ways IT Can Strengthen the Ties
IBM Research's Chief Scientist Talks AI for Cloud Migration
Scale Your Machine Learning with MLOps
How to Create a Successful AI Program
News & Commentary
Flurry of Warnings Highlight Cyber Threats to US Elections
FBI and intelligence officials issue fresh warnings about election interference attempts by Iranian and Russian threat actors.
By Jai Vijayan Contributing Writer, 10/23/2020
0 comments  |  Read  |  Post a Comment
The Upside to Deepfake Technology
Deepfake technology has received its fair share of scorn, but as remote collaboration vendors incorporate more AI features into their offerings, the “deepfake” stigma will wane.
By James Kobielus Tech Analyst, Consultant and Author, 10/23/2020
0 comments  |  Read  |  Post a Comment
2020: The Year Everyone Became an IT Employee
The pandemic has rendered IT roles more demanding and more important than ever before. And every employee has essentially become an extension of the IT team.
By Vijay Kurkal, CEO, Resolve , 10/23/2020
0 comments  |  Read  |  Post a Comment
Need for 'Guardrails' in Cloud-Native Applications Intensifies
With more organizations shifting to cloud services in the pandemic, experts say the traditionally manual process of securing them will be replaced by automated tools in 2021 and beyond.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/22/2020
0 comments  |  Read  |  Post a Comment
Minimizing Human Errors to Improve Data Center Reliability
A simple mistake made in a data center can have serious consequences. Here's how to detect and prevent common errors before they can damage schedules, budgets, revenue, and perhaps even lives.
By John Edwards Technology Journalist & Author, 10/22/2020
0 comments  |  Read  |  Post a Comment
Oracle Releases Another Mammoth Security Patch Update
October's CPU contains 402 patches for vulnerabilities across 29 product sets, many of which are remotely executable without the need for authentication.
By Jai Vijayan Contributing Writer, 10/21/2020
0 comments  |  Read  |  Post a Comment
CIOs Prep for 2021 Post-Pandemic Opportunity
Gartner's CIO Agenda survey reveals that top CIOs are capitalizing on renewed interest by corporate boards in digital business and technologies for improving customer experience.
By Jessica Davis Senior Editor, Enterprise Apps, 10/21/2020
0 comments  |  Read  |  Post a Comment
Why Higher Ed CIOs Should Embrace Moving to the Cloud
An initial cloud migration investment can deliver both immediate and long-term benefits -- especially if the infrastructure evolves along with an institution’s digital operations.
By Dave Michaud, VP, General Manager, Contegix , 10/21/2020
0 comments  |  Read  |  Post a Comment
Businesses Rethink Endpoint Security for 2021
The mass movement to remote work has forced organizations to rethink their long-term plans for endpoint security. How will things look different next year?
By Kelly Sheridan Staff Editor, Dark Reading, 10/20/2020
0 comments  |  Read  |  Post a Comment
Citizen Developers: 8 Ways IT Can Strengthen the Ties
The exponential growth of citizen developers in organizations is forcing IT to rethink its role and the skillsets that it has historically valued. What are IT organizations doing to adjust?
By Mary E. Shacklett Mary E. Shacklett, 10/20/2020
0 comments  |  Read  |  Post a Comment
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
US Department of Justice charges members of Sandworm/APT28 for BlackEnergy, NotPetya, Olympic Destroyer, and other major attacks.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/19/2020
1 Comment  |  Read  |  Post a Comment
Microsoft Tops Q3 List of Most-Impersonated Brands
The technology sector was also the most likely targeted industry for brand phishing attacks, according to Check Point's latest report on brand phishing.
By Steve Zurier Contributing Writer, 10/19/2020
0 comments  |  Read  |  Post a Comment
Making Developers More DevSecOps Aware
Interop Digital conference tackled why it is important for IT professionals to develop vulnerability remediation habits.
By Joao-Pierre S. Ruth Senior Writer, 10/19/2020
0 comments  |  Read  |  Post a Comment
To Operationalize AI, Invest in Humans
Enterprise organizations are showing strong interest in artificial intelligence, but many are struggling to move beyond experimentation.
By Ron Sielinski, Microsoft, and Arun Shastri, ZS , 10/19/2020
0 comments  |  Read  |  Post a Comment
US Counterintelligence Director & Fmr. Europol Leader Talk Election Security
The US counterintelligence lead joins a former Europol cyber chief to discuss modern election threats and the benefits of public-private collaboration.
By Kelly Sheridan Staff Editor, Dark Reading, 10/16/2020
1 Comment  |  Read  |  Post a Comment
Scale Your Machine Learning with MLOps
When it is time for your machine learning pilot programs to graduate and take on the real world, you need to start looking at MLOps.
By Jessica Davis Senior Editor, Enterprise Apps, 10/16/2020
0 comments  |  Read  |  Post a Comment
Data in Motion Drives Enterprise Change
Data in motion involves several different situations that might require different architectures, applications and management techniques. Here’s what you need to know.
By Ashish Verma, Deloitte Consulting, and Thomas H. Davenport, Deloitte AI , 10/16/2020
0 comments  |  Read  |  Post a Comment
IBM Research’s Chief Scientist Talks AI for Cloud Migration
Part of the future is already here as AI increases its influence on hybrid cloud and the digital transformation equation, according to Ruchir Puri.
By Joao-Pierre S. Ruth Senior Writer, 10/15/2020
0 comments  |  Read  |  Post a Comment
Microsoft Office 365 Accounts a Big Target for Attackers
Just as they did with PowerShell for Windows, threat actors are abusing native O365 capabilities for lateral movement, command-and-control communication, and other malicious activity.
By Jai Vijayan Contributing Writer, 10/15/2020
0 comments  |  Read  |  Post a Comment
How to Create a Successful AI Program
Artificial intelligence can be promising and valuable, but you need to focus on a few best practices to get your program moving in the right direction.
By Jessica Davis Senior Editor, Enterprise Apps, 10/14/2020
0 comments  |  Read  |  Post a Comment
More Stories
Think Like a Chief Innovation Officer and Get Work Done
Joao-Pierre S. Ruth, Senior Writer,  10/13/2020
10 Trends Accelerating Edge Computing
Cynthia Harvey, Freelance Journalist, InformationWeek,  10/8/2020
Northwestern Mutual CIO: Riding Out the Pandemic
Jessica Davis, Senior Editor, Enterprise Apps,  10/7/2020
Register for InformationWeek Newsletters
White Papers
Current Issue
[Special Report] Edge Computing: An IT Platform for the New Enterprise
Edge computing is poised to make a major splash within the next generation of corporate IT architectures. Here's what you need to know!
2020 State of DevOps Report
Download this report today to learn more about the key tools and technologies being utilized, and how organizations deal with the cultural and process changes that DevOps brings. The report also examines the barriers organizations face, as well as the rewards from DevOps including faster application delivery, higher quality products, and quicker recovery from errors in production.
Video
Sponsored Video
Slideshows
Twitter Feed
Flash Poll