IoT
IoT
InformationWeek 2016 Salary Survey: 10 Best-Paying IT Jobs
IT, Dev Boot Camps Help Kick-Start Careers
ClubCorp CIO Sees Cloud As Hole In One For Golf
IoT Success: Sharing Data, Analytics Fuels Growth
6 Reasons Bimodal IT Is Wrong For You
News & Commentary
Scalable IoT Deployments Gain Momentum, IDC Finds
Scott Ferguson, Director of Audience Development, UBM Tech
News
Despite security and cost concerns, businesses and their IT teams are moving forward on practical deployments of internet of things technologies, according to a survey from IDC. The report reinforces other recent findings about IoT and what IT needs to know.
By Scott Ferguson Director of Audience Development, UBM Tech, 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
25 Emerging Security Vendors To Watch
Kelly Sheridan, Associate Editor, InformationWeek
News
A wave of companies is entering the security field armed with technologies to help businesses mitigate the next generation of cyberattacks. Who are these emerging vendors and what can they offer?
By Kelly Sheridan Associate Editor, InformationWeek, 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
Top 125 Vendors To Watch
InformationWeek Staff,
Commentary
InformationWeek and its sister publications Dark Reading and Network Computing have teamed up to bring you a roundup of the hottest vendors in cloud, data management, DevOps, infrastructure, and security. The 125 vendors you'll find here range from established players making strides in their markets to newcomers setting the stage for the future.
By InformationWeek Staff , 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
Yahoo Confirms August Data Dump Issue Unrelated To Breach Of 500 Million Users
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
No 'connection' between August 2016 data dump claims and 2014 nation-state attack, company says.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
25 Data Management Vendors Worth Watching
Jessica Davis,  Senior Editor, Enterprise Apps
Commentary
More data, more types of data, and the need to leverage it all to create more business value -- those are some of the drivers behind enterprise adoption of master data management platforms.
By Jessica Davis Senior Editor, Enterprise Apps, 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
25 DevOps Vendors Worth Watching
Curtis Franklin Jr., Executive Editor, Technical Content
Commentary
DevOps depends on automated deployment tools and products that support practices such as continuous development, deployment, and improvement of enterprise software. Here's a look at vendors and their tools to know if you are making a move to DevOps.
By Curtis Franklin Jr. Executive Editor, Technical Content, 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
Mobile Fraud Changes Outlook for Multifactor Authentication
Stephen Maloney, Executive VP, Business Development & Strategy, Acuant
Commentary
SMS one-time passcodes just won't cut it anymore. We need new approaches that people will actually use.
By Steve Maloney , 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
25 Cloud Vendors Worth Watching
Charles Babcock, Editor at Large, Cloud
Commentary
Cloud services are firmly established in the fabric of IT staff operations as necessary and growing ingredients of enterprise computing. No matter your business model or industry vertical, chances are that you've already made strides into the cloud and are looking at additional resources. With that in mind, we offer a roundup of 25 options to consider in your cloud ecosystem -- including cloud services for public, private, and hybrid options, as well as management and monitoring tools.
By Charles Babcock Editor at Large, Cloud, 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
Microsoft Launches Windows Defender App Guard For Its Edge Browser
Kelly Sheridan, Associate Editor, InformationWeek
News
Microsoft debuts a new tool to strengthen security in its Edge browser for Windows Enterprise customers.
By Kelly Sheridan Associate Editor, InformationWeek, 9/26/2016
Comment0 comments  |  Read  |  Post a Comment
What The WADA Hack Proves About Today's Threat Landscape
Gary Newe, Director of Systems Engineering, F5 Networks
Commentary
Fancy Bear's initial release of data on four top American athletes reminds us all to reassess our risks.
By Gary Newe , 9/26/2016
Comment0 comments  |  Read  |  Post a Comment
Beachbody Is Shaping Up For Public Cloud
Charles Babcock, Editor at Large, Cloud
News
Beachbody is a fitness product specialist with custom financials and ERP needs. However, these systems are a hindrance when it comes to migrating to Oracle Cloud.
By Charles Babcock Editor at Large, Cloud, 9/26/2016
Comment0 comments  |  Read  |  Post a Comment
14 Traits Of The Best Data Scientists
Lisa Morgan, Freelance Writer
News
Looking for a unicorn? Get in line. Actual data scientists are in high demand, and there's not enough of them to go around. If you want to identify the right talent, consider these tips.
By Lisa Morgan Freelance Writer, 9/26/2016
Comment0 comments  |  Read  |  Post a Comment
7 New Rules For IoT Safety & Vuln Disclosure
Lysa Myers, Security Researcher, ESET
Commentary
In the Internet of Things, even the lowliest smart device can be used for a malicious purpose. Manufacturers take heed!
By Lysa Myers Security Researcher, ESET, 9/24/2016
Comment0 comments  |  Read  |  Post a Comment
On-Premises & In The Cloud: Making Sense Of Your Cybersecurity Ecosystem
Yishai Beeri, Director of Cybersecurity Research, CloudLock
Commentary
As enterprises continue to invest in hybrid cloud strategies, they need their fragmented security solutions to work together.
By Yishai Beeri Director of Cybersecurity Research, CloudLock, 9/23/2016
Comment0 comments  |  Read  |  Post a Comment
IT, Dev Boot Camps Help Kick-Start Careers
Jessica Davis,  Senior Editor, Enterprise Apps
News
IT pros and developers looking for new opportunities and new grads looking for an advantage in getting that first IT job are exploring new education options -- IT and technology education boot camps. In this InformationWeek Expert Voice podcast, we spoke with a provider of these intensive sessions about what they are and why they are becoming popular now.
By Jessica Davis Senior Editor, Enterprise Apps, 9/23/2016
Comment0 comments  |  Read  |  Post a Comment
InformationWeek 2016 Salary Survey: 10 Best-Paying IT Jobs
Susan Nunziata, Editorial Director
News
Median base annual salary for IT workers was flat this year, according to the results of the InformationWeek 2016 US IT Salary Survey. Still, certain roles -- including architect, project leader, and security specialist -- are commanding much higher median salaries than other roles. See if you're in one of the 10 best-paying IT staff positions -- and how your total compensation stacks up.
By Susan Nunziata Editorial Director, 9/23/2016
Comment3 comments  |  Read  |  Post a Comment
Yahoo Reveals Nation State-Borne Data Breach Affecting A Half-Billion Users
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
But still unconfirmed is whether the newly revealed attack is related to recently dumped Yahoo user credentials in an online cybercrime forum.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/22/2016
Comment9 comments  |  Read  |  Post a Comment
7 Factors That Make Security Organizations More Effective
Steve Zurier, Freelance Writer
News
(ISC)2 members have plenty of technical chops, but IANS research found they need to focus more on how infosec aligns with the business.
By Steve Zurier Freelance Writer, 9/22/2016
Comment1 Comment  |  Read  |  Post a Comment
Snowden: Hollywood Highlights 2 Persistent Privacy Threats
Will Ackerly, Co-Founder & CTO, Virtru
Commentary
Oliver Stoneís movie shows us that while most of us have nothing to hide, we all have information worth protecting Ė both technically and constitutionally.
By Will Ackerly Co-Founder & CTO, Virtru, 9/22/2016
Comment11 comments  |  Read  |  Post a Comment
ClubCorp CIO Sees Cloud As Hole In One For Golf
Charles Babcock, Editor at Large, Cloud
News
ClubCorp CIO Patrick Benson is finding that both infrastructure-as-a-service and software-as-a-service are important to migration. The two cloud technologies are also fundamental for future mobile applications.
By Charles Babcock Editor at Large, Cloud, 9/22/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Slideshows
InformationWeek 2016 Salary Survey: 10 Best-Paying IT Jobs
Susan Nunziata, Editorial Director,  9/23/2016
News
IT, Dev Boot Camps Help Kick-Start Careers
Jessica Davis, Senior Editor, Enterprise Apps,  9/23/2016
Slideshows
6 Reasons Bimodal IT Is Wrong For You
Curtis Franklin Jr., Executive Editor, Technical Content,  9/21/2016
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
The Dynamics Of The Digital Workplace
As companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience. Read >>
Partner Perspectives
What's This??
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but thatís arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which theyíre developed ó even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio