IoT
10 Ways To Geek Out Your Valentine's Day
iPhone Error 53 Prompts Lawsuit Against Apple
How eBay's Kylin Tool Makes Sense Of Big Data
Google Plans VR Headset That Won't Rely On Smartphones
Women Execs Boost Company Profits, Study Finds
News & Commentary
Quick Guide To Cyber Insurance Shopping
Ericka Chickowski, Contributing Writer, Dark Reading
News
Experts offer their opinions on important due diligence tasks when procuring cyber insurance.
By Ericka Chickowski Contributing Writer, Dark Reading, 2/12/2016
Comment0 comments  |  Read  |  Post a Comment
Ukraine Railway, Mining Company Attacked With BlackEnergy
Jai Vijayan, Freelance writer
News
Weeks after the malware played a role in a massive power outage in the Ukraine, BlackEnergy and its cohort KillDisk were used in other attacks as well, Trend Micro says.
By Jai Vijayan Freelance writer, 2/12/2016
Comment0 comments  |  Read  |  Post a Comment
iPhone Error 53 Prompts Lawsuit Against Apple
Eric Zeman,
Commentary
Following on reports of the iPhone Error 53, Apple is being taken to task for bricking the iPhones of consumers who sought out cheaper repairs. Attorneys are asking users to join a class action lawsuit against the company.
By Eric Zeman , 2/12/2016
Comment1 Comment  |  Read  |  Post a Comment
Perceptions Of IT Risk Changing In Business Ranks
Ericka Chickowski, Contributing Writer, Dark Reading
News
Business leaders increasingly see IT risk as huge, but policy making and visibility still lag.
By Ericka Chickowski Contributing Writer, Dark Reading, 2/12/2016
Comment0 comments  |  Read  |  Post a Comment
How eBay's Kylin Tool Makes Sense Of Big Data
Charles Babcock, Editor at Large, Cloud
News
When eBay needed to gain more value out of masses of Hadoop data, the company created its own an open source tool called Kylin. Now Kylin is an Apache Foundation project.
By Charles Babcock Editor at Large, Cloud, 2/12/2016
Comment1 Comment  |  Read  |  Post a Comment
Man Admits To Laundering $19.6 Million in Hacking, Telecom Fraud Scam
Dark Reading Staff,
News
Hacking increasingly being used as a way to enhance a variety of other criminal endeavors.
By Dark Reading Staff , 2/12/2016
Comment0 comments  |  Read  |  Post a Comment
Google Plans VR Headset That Won't Rely On Smartphones
Nathan Eddy, Freelance Writer
News
The race for dominance of the virtual reality market continues as Google plans to introduce a more sophisticated headset to market. Unlike Cardboard, this new VR headset won't rely on a smartphone, according to reports.
By Nathan Eddy Freelance Writer, 2/12/2016
Comment1 Comment  |  Read  |  Post a Comment
Cybersecurity & Healthcare: Does Cybersecurity Act Help or Hurt?
Jay Trinckes, Senior Practice Lead, Healthcare & Life Sciences, Coalfire
Commentary
Without adequate resources, the new Cybersecurity Act of 2015 Act is merely a snapshot in time that does little to safeguard sensitive medical information.
By Jay Trinckes Senior Practice Lead, Healthcare & Life Sciences, Coalfire, 2/12/2016
Comment1 Comment  |  Read  |  Post a Comment
Women Execs Boost Company Profits, Study Finds
David Wagner, Executive Editor, Community & IT Life
News
Companies with more women in executive positions correlated with increased profitability, according to a new study.
By David Wagner Executive Editor, Community & IT Life, 2/12/2016
Comment3 comments  |  Read  |  Post a Comment
Google Runs Custom Networking Chips
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Google engineers contributed open source code to the LLVM compile project, revealing the company's use of in-house silicon.
By Thomas Claburn Editor at Large, Enterprise Mobility, 2/12/2016
Comment1 Comment  |  Read  |  Post a Comment
Transforming An Antiquated Business Intelligence Process
Rich Wagner, President and CEO of Prevedere
Commentary
The personal story of how one executive transformed an unused business intelligence system.
By Rich Wagner President and CEO of Prevedere, 2/12/2016
Comment0 comments  |  Read  |  Post a Comment
10 Ways To Geek Out Your Valentine's Day
Dawn Kawamoto, Freelance Writer and Editor
News
Valentine's Day is upon us, so it's time to come up with the ultimate plan for that special geek in your life. From cool activities to got-to-have gifts, here are 10 ideas for the perfect geek-tastically romantic day.
By Dawn Kawamoto Freelance Writer and Editor, 2/12/2016
Comment1 Comment  |  Read  |  Post a Comment
Congress Passes Judicial Redress Act, UK Snoopers' Charter Gets Closer Look
Dark Reading Staff,
News
European citizens win right to sue the Americans over privacy violations, while Britain ponders new ways to commit privacy violations.
By Dark Reading Staff , 2/11/2016
Comment1 Comment  |  Read  |  Post a Comment
Microsoft: 74 Device Partners Will Bring Office To Android
Kelly Sheridan, Associate Editor, InformationWeek
News
Microsoft is finding new routes to mobile success by partnering with 74 device makers to bring its apps and services, including Office, to Android tablets and smartphones.
By Kelly Sheridan Associate Editor, InformationWeek, 2/11/2016
Comment2 comments  |  Read  |  Post a Comment
Qualcomm Snapdragon Wear 2100: Dedicated Processor For Wearables
Eric Zeman,
Commentary
Qualcomm's newly released Snapdragon Wear 2100 is a new processor platform that will power the next generation of Android Wear smart devices. The chipmaker also detailed new platforms for smartphones and tablets.
By Eric Zeman , 2/11/2016
Comment1 Comment  |  Read  |  Post a Comment
Google Gives Away 2GB Of Storage To Promote Security
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Google does its part for Safer Internet Day with its giveaway. Also, Gmail users will start seeing warnings when message senders can't be authenticated and when they don't support transport encryption.
By Thomas Claburn Editor at Large, Enterprise Mobility, 2/11/2016
Comment3 comments  |  Read  |  Post a Comment
3 Flavors of Machine Learning: Who, What & Where
Giora Engel, VP Product & Strategy, LightCyber
Commentary
To get beyond the jargon of ML, you have to consider who (or what) performs the actual work of detecting advanced attacks: vendor, product or end-user.
By Giora Engel VP Product & Strategy, LightCyber, 2/11/2016
Comment0 comments  |  Read  |  Post a Comment
Google Expands 'Right To Be Forgotten' To More Websites
Nathan Eddy, Freelance Writer
News
In a bid to assuage European objections over "right to be forgotten" issues, Google will scrub search results from more of its websites in Europe.
By Nathan Eddy Freelance Writer, 2/11/2016
Comment1 Comment  |  Read  |  Post a Comment
VMware vRealize Suite 7 Enhances Data Center, Cloud Management
Charles Babcock, Editor at Large, Cloud
News
VMware's newly released vRealize Suite 7 includes six components meant to bring more intelligence to virtual workload management, whether companies are using their own clouds or a public cloud.
By Charles Babcock Editor at Large, Cloud, 2/11/2016
Comment1 Comment  |  Read  |  Post a Comment
Yahoo Layoffs Begin, Starting With Sunnyvale HQ
Michelle Maisto, Freelance Writer
News
Yahoo has promised to cut 1,700 positions, and it appears to have dropped the axe first in Sunnyvale by laying off 107 employees from its headquarters.
By Michelle Maisto Freelance Writer, 2/11/2016
Comment3 comments  |  Read  |  Post a Comment
More Stories
PR Newswire
10 Unique Perks At Tech Companies
David Wagner, Executive Editor, Community & IT Life,  2/9/2016
Comic: Respect Your Elders
Brian Moore, Cartoonist & Illustrator,  2/8/2016
Google Killing Off Flash-Based Ads By June
Michelle Maisto, Freelance Writer,  2/10/2016
Register for InformationWeek Newsletters
White Papers
Current Issue
How to Knock Down Barriers to Effective Risk Management
Risk management today is a hodgepodge of systems, siloed approaches, and poor data collection practices. That isn't how it should be.
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio