InformationWeek News Connects The Business Technology Community
IoT
IoT
GoDaddy Revamps BI Tools To Enable Self-Service
5 Things That Will Keep IT Execs Up At Night In 2017
Server Survey: Footprint Can Be Cut 54% Via Upgrades, Cloud
'Snowmobile' Shows AWS At Its Blue-Collar Best
IT Products Go from Big Noise to Big Business
News & Commentary
Digital Workspaces Winning Acceptance Through Flexibility, Security
Charles Babcock, Editor at Large, Cloud
News
VMware survey shows digital workspace users gaining enterprise agility through greater mobile workforce activity, added business initiative.
By Charles Babcock Editor at Large, Cloud, 1/17/2017
Comment1 Comment  |  Read  |  Post a Comment
AI Technology Takes Center Stage At Retail Convention
Jessica Davis,  Senior Editor, Enterprise Apps
News
Artificial intelligence (AI) and other leading-edge technologies will be highlights of this year's National Retail Federation (NRF) Big Show in New York, but many retailers are still struggling with more rudimentary analytics.
By Jessica Davis Senior Editor, Enterprise Apps, 1/16/2017
Comment0 comments  |  Read  |  Post a Comment
Ransomware: How A Security Inconvenience Became The Industry's Most-Feared Vulnerability
Gur Shatz, CTO and co-founder, Cato Networks
Commentary
There are all sorts of ways to curb ransomware, so why has it spread so successfully?
By Gur Shatz CTO and co-founder, Cato Networks, 1/16/2017
Comment0 comments  |  Read  |  Post a Comment
3 Ways Shadow Analytics May Be Working Against You
Lisa Morgan, Freelance Writer
Commentary
Analytics is popping up in more functional areas of businesses, outside of IT's control. Like BYOB, the trend is inevitable. How will your organization manage it?
By Lisa Morgan Freelance Writer, 1/16/2017
Comment0 comments  |  Read  |  Post a Comment
WhatsApp Denies It Has Backdoor For Decrypting Messages
Jai Vijayan, Freelance writer
News
ĎBackdoorí is really a feature for ensuring messages are not lost in certain situations, company claims.
By Jai Vijayan Freelance writer, 1/13/2017
Comment0 comments  |  Read  |  Post a Comment
Why You Need To Embrace DevOps Differently
Guest Commentary, Guest Commentary
Commentary
Before you jump into DevOps understand what problems you are trying to solve, and whether you need to make a complete commitment to all of the elements or just specific aspects.
By Sebastian Velez, Director at the Center of Excellence at PSL , 1/13/2017
Comment0 comments  |  Read  |  Post a Comment
10 Cocktail Party Security Tips From The Experts
Steve Zurier, Freelance Writer
News
Security pros offer basic advice to help average users ward off the bad guys.
By Steve Zurier Freelance Writer, 1/13/2017
Comment2 comments  |  Read  |  Post a Comment
Enel Moves Onto Amazon To Implement New Utility Strategy
Charles Babcock, Editor at Large, Cloud
News
The giant Italian utility, Enel, is moving to the cloud to support it's Open Power strategy around the world, adding green power sources.
By Charles Babcock Editor at Large, Cloud, 1/13/2017
Comment1 Comment  |  Read  |  Post a Comment
Ex-US National Security Official Clarke: Regulation Key To Protecting ICS/SCADA From Cyberattacks
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Richard Clarke proposes a Y2K-style approach to beefing up security for critical infrastructure.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/12/2017
Comment0 comments  |  Read  |  Post a Comment
Be Recognized For IT Excellence
James M. Connolly, Executive Managing Editor, InformationWeekEditor in Chief
Commentary
Organizations of all sizes and from all sectors are invited to apply for the 2017 InformationWeek IT Excellence Awards.
By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 1/12/2017
Comment0 comments  |  Read  |  Post a Comment
Software-Defined Storage & Containers: Solution For Shared Service Providers
Sebastien Han, Principal Software Engineer, Storage Architect, Red Hat
Shared service providers, including telephone companies, hosting services, and related businesses, stand to benefit from the combination of containerized microservices and software-defined storage.
By Sebastien Han Principal Software Engineer, Storage Architect, Red Hat, 1/12/2017
Comment0 comments  |  Read  |  Post a Comment
Crowdsourcing 20 Answers To Security Ops & IR Questions
Joshua Goldfarb, VP & CTO - Emerging Technologies, FireEye
Commentary
ďThose who know do not speak. Those who speak do not know.Ē Why it pays to take a hard look at our own incident response functions and operations.
By Joshua Goldfarb VP & CTO - Emerging Technologies, FireEye, 1/12/2017
Comment1 Comment  |  Read  |  Post a Comment
Addressing The Runaway Demand For Information Security
Guest Commentary, Guest Commentary
Commentary
With organizations going through digital transformation,IT leaders must fundamentally change how information security services are delivered, and make security part of everyone's job.
By By Jeremy Bergsman, IT Practice Leader at CEB , 1/12/2017
Comment1 Comment  |  Read  |  Post a Comment
451 Research: Containers A $2.7 Billion Market By 2020
Charles Babcock, Editor at Large, Cloud
News
451 Research sees containers filling a more prominent role in the cloud technologies market by 2020; the container ecosystem growing fast.
By Charles Babcock Editor at Large, Cloud, 1/12/2017
Comment0 comments  |  Read  |  Post a Comment
3 No-brainer Uses for the Public Cloud
Andrew Froehlich, President & Lead Network Architect, West Gate Networks
Commentary
While many enterprise needs will require the use of a private or hybrid cloud architecture, there are some uses that truly take advantage of the benefits that only the public cloud can deliver.
By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 1/11/2017
Comment0 comments  |  Read  |  Post a Comment
Credit Freeze: The New Normal In Data Breach Protection?
Lysa Myers, Security Researcher, ESET
Commentary
In era of rampant identity theft, consumers should be offered the protection of a credit freeze by default, instead of a nuisance fee each time a freeze is placed or removed.
By Lysa Myers Security Researcher, ESET, 1/11/2017
Comment1 Comment  |  Read  |  Post a Comment
Measuring the Performance of Enterprise Architecture
Imre Kabai,
Commentary
Enterprise architecture teams often struggle with measuring and communicating the value of their function. We have implemented a set of simple and straight-forward performance indicators to address this problem.
By Imre Kabai , 1/11/2017
Comment1 Comment  |  Read  |  Post a Comment
The 3 C's Of Security Awareness
Lance Spitzner, Director, SANS Institute Securing The Human Security Awareness Program
Commentary
Explaining the technical part of security comes easy for many of us. But the soft skills needed to change behavior are often sadly missing.
By Lance Spitzner Director, SANS Institute Securing The Human Security Awareness Program, 1/11/2017
Comment9 comments  |  Read  |  Post a Comment
Survey Points to Slight Rise in Adaptive Authentication Over 2FA
Steve Zurier, Freelance Writer
News
SecureAuth study reports a majority of IT decision makers and security pros have issues with two-factor authentication.
By Steve Zurier Freelance Writer, 1/11/2017
Comment0 comments  |  Read  |  Post a Comment
Global Survey: Innovation, Movement Of Data Get More Restrictions
Charles Babcock, Editor at Large, Cloud
Commentary
Foundation finds more countries passing restrictions on use of intellectual property within their borders, export of data out.
By Charles Babcock Editor at Large, Cloud, 1/10/2017
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Commentary
Be Recognized For IT Excellence
James M. Connolly, Executive Managing Editor, InformationWeekEditor in Chief,  1/12/2017
Commentary
4 Ways Data-First Competitors Are Killing You
Lisa Morgan, Freelance Writer,  1/10/2017
Commentary
Amazon: The Self-Fueling, Perpetual Motion Machine
Charles Babcock, Editor at Large, Cloud,  1/9/2017
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
The Dynamics Of The Digital Workplace
As companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience. Read >>
Partner Perspectives
What's This??
Software-Defined Storage & Containers: Solution For Shared Service Providers
Shared service providers, including telephone companies, hosting services, and related businesses, stand to benefit from the combination of containerized microservices and software-defined storage. Read >>
Partner Perspectives
What's This?
Job Loss And Financial Damage: CIOs' Main Fears When Adopting Virtualization
Companies aren't prepared for the security challenges of hybrid infrastructures, Bitdefender study reveals. Read >>
White Papers
Current Issue
Annual IT Salary Report†
Base pay for IT professionals has remained flat this year with a median annual salary of $88,000 for staff and $112,000 for management. However, 58% of staff and 62% of managers who responded to our survey say they're satisfied with their compensation. Download this report to find out which positions earn the highest compensation.
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Flash Poll