IoT
Google, Apple Aim To Kill Passwords
MIT's Eyeriss GPU Could Transform IoT, AI
Facebook Faces Trouble In France For Tracking Non-Users
BIOS Hack Detection Added To Dell Enterprise Security Suite
9 Biographies Of Tech Icons You Should Know
News & Commentary
New White House Cybersecurity Plan Creates Federal CISO
Sara Peters, Senior Editor at Dark Reading
News
Cybersecurity National Action Plan aims to increase federal cybersecurity spending by 35 percent to modernize IT and address skills shortage, IoT.
By Sara Peters Senior Editor at Dark Reading, 2/9/2016
Comment0 comments  |  Read  |  Post a Comment
Google, Apple Aim To Kill Passwords
Dawn Kawamoto, Freelance Writer and Editor
News
Apple, Yahoo, and Google are making inroads into enabling smartphones to become a replacement for entering passwords -- a move that may not come soon enough for some users and help desks.
By Dawn Kawamoto Freelance Writer and Editor, 2/9/2016
Comment1 Comment  |  Read  |  Post a Comment
MIT's Eyeriss GPU Could Transform IoT, AI
Michelle Maisto, Freelance Writer
News
MIT researchers have developed a GPU called Eyeriss that could enable algorithms to run locally and instantly, instead of sending raw data into the cloud. This means that a future version of Siri could get you answers much faster.
By Michelle Maisto Freelance Writer, 2/9/2016
Comment0 comments  |  Read  |  Post a Comment
Apple TV Gets Voice Dictation In Latest Round Of OS Betas
Eric Zeman,
Commentary
Apple pushed out new builds of tvOS, watchOS, iOS, and OS X this week, adding features and improving performance along the way.
By Eric Zeman , 2/9/2016
Comment0 comments  |  Read  |  Post a Comment
Chinese Cyberspies Pivot To Russia In Wake Of Obama-Xi Pact
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Kaspersky Lab has identified a massive uptick in cyber espionage in Russia by 'Chinese-speaking' APTs.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/9/2016
Comment0 comments  |  Read  |  Post a Comment
Facebook Faces Trouble In France For Tracking Non-Users
Nathan Eddy, Freelance Writer
News
The CNIL, France's data regulation authority, has issued a formal notice to Facebook, warning the social network that it needs to fairly collect data concerning the browsing activity of Internet users who do not have an account.
By Nathan Eddy Freelance Writer, 2/9/2016
Comment0 comments  |  Read  |  Post a Comment
Education IT: Hot Tech Trends To Watch
Esther Schindler, Writer and Translator
Commentary
Cloud, big data, and security are all big factors in education IT this year. At the same time, there is a cultural shift taking place not only among the student body, but within the demographics of the IT departments themselves.
By Esther Schindler Writer and Translator, 2/9/2016
Comment0 comments  |  Read  |  Post a Comment
BIOS Hack Detection Added To Dell Enterprise Security Suite
Larry Loeb, Blogger, Informationweek
News
With millions of machines potentially vulnerable to attacks on their BIOS firmware, Dell has introduced a verification tool designed for enterprise IT to monitor users' machines and intervene if an attack is detected. The cloud-based tool takes a different approach than other BIOS offerings on the market.
By Larry Loeb Blogger, Informationweek, 2/9/2016
Comment0 comments  |  Read  |  Post a Comment
Gartner BI Magic Quadrant: Inflection Point Has Arrived
Jessica Davis,  Senior Editor, Enterprise Apps
News
Reflecting the fundamental transformation in the market, Gartner has changed how it evaluates vendors in its 2016 Magic Quadrant for BI and Analytics. Only three vendors survived the cut and stayed in the Leaders Quadrant. Here's a look at the changes.
By Jessica Davis Senior Editor, Enterprise Apps, 2/9/2016
Comment0 comments  |  Read  |  Post a Comment
10 Unique Perks At Tech Companies
David Wagner, Executive Editor, Community & IT Life
News
Tech companies are well represented on Glassdoor's rankings of the top beyond-the-basics perks and benefits offered to employees. See 10 of the most interesting and surprising.
By David Wagner Executive Editor, Community & IT Life, 2/9/2016
Comment5 comments  |  Read  |  Post a Comment
Brazilian Cyberspies In Suits Shake Down Victims With Stolen Company Secrets
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
'Poseidon Group' puts a new spin on cyber-extortion, and operates across land and sea.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/9/2016
Comment1 Comment  |  Read  |  Post a Comment
Google's Next Cardboard Could Be Plastic
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Google is said to be preparing an updated VR headset. The new version could include more sensors, higher quality lenses, and a plastic shell.
By Thomas Claburn Editor at Large, Enterprise Mobility, 2/8/2016
Comment0 comments  |  Read  |  Post a Comment
Comic: Respect Your Elders
Brian Moore, Cartoonist & Illustrator
Commentary
In tech, we tend to like the new and shiny. But never forget the power of legacy systems, whether they are actual systems or just older IT pros.
By Brian Moore Cartoonist & Illustrator, 2/8/2016
Comment3 comments  |  Read  |  Post a Comment
iPhone Error 53 Is A Deadly Security Feature
Dawn Kawamoto, Freelance Writer and Editor
News
iPhone users are seeing a new twist on the dreaded "Error 53" screens, which signals a smartphone is beyond repair. Apple reportedly notes that Error 53 is the result of a Touch ID security feature designed to protect users.
By Dawn Kawamoto Freelance Writer and Editor, 2/8/2016
Comment3 comments  |  Read  |  Post a Comment
Monday Morning Quarterbacking Super Bowl 50: Infosec Edition
Tim Helming, Director of Product Management, DomainTools
Commentary
How to coach your team to victory in the battle to protect corporate data and intellectual property. After all, there’s a lot riding on your game, too.
By Tim Helming Director of Product Management, DomainTools, 2/8/2016
Comment1 Comment  |  Read  |  Post a Comment
Docker Engine 1.10 Puts Emphasis On Container Security
Charles Babcock, Editor at Large, Cloud
News
With the release of the Docker Engine 1.10, Docker is putting security at center stage to address user demand. The company has also issued several other updates.
By Charles Babcock Editor at Large, Cloud, 2/8/2016
Comment1 Comment  |  Read  |  Post a Comment
'AlienSpy' Family Openly Sold As Subscription Service
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Adwind -- a relative of the infamous AlienSpy spyware -- offered as malware-as-a-service to all types of attackers.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/8/2016
Comment0 comments  |  Read  |  Post a Comment
BlackBerry Layoffs Leave Dark Cloud Over Handset Business
Eric Zeman,
Commentary
BlackBerry cut about 200 employees this month, which prompted many to question its commitment to smartphones, BlackBerry 10 in particular.
By Eric Zeman , 2/8/2016
Comment3 comments  |  Read  |  Post a Comment
US DOJ, DHS Yet To Confirm Breach, Leak
Dark Reading Staff,
News
Apparent names, job titles, contact information of 9,000 Department of Homeland Security employees posted on Twitter.
By Dark Reading Staff , 2/8/2016
Comment1 Comment  |  Read  |  Post a Comment
10 Shocking New Facts About Ransomware
Ericka Chickowski, Contributing Writer, Dark Reading
News
Ransomware has taken over the cybercriminal world in the last few years and there's no end in sight.
By Ericka Chickowski Contributing Writer, Dark Reading, 2/8/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
PR Newswire
10 Quirky Tech Job Interview Questions That May Stump You
Kelly Sheridan, Associate Editor, InformationWeek,  2/4/2016
Email Etiquette: 5 Ways To Write Better Corporate Email
Jonathan Feldman, CIO, City of Asheville, NC,  2/3/2016
Yahoo To Lay Off 15% Of Workforce, Hints At Sale Of Assets
Dawn Kawamoto, Freelance Writer and Editor,  2/3/2016
Register for InformationWeek Newsletters
White Papers
Current Issue
How to Knock Down Barriers to Effective Risk Management
Risk management today is a hodgepodge of systems, siloed approaches, and poor data collection practices. That isn't how it should be.
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio