People operating criminal services on Tor and other darknets attack each other frequently, a study by Trend Micro shows.By Jai Vijayan Freelance writer, 5/30/20173 comments | Read | Post a Comment
But counterfeit ad inventory the next big worry for online advertisers.By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/30/20171 Comment | Read | Post a Comment
Digital transformation, think of it as a shift in philosophy within your organization, not just a tech project.By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 5/30/20170 comments | Read | Post a Comment
Attention: You may see some error messages when opening IW content this week. We are going through some back-end conversions that will improve performance going forward.By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 5/30/20170 comments | Read | Post a Comment
It's practical, not theoretical. Developers who rely on cloud resources will be among those producing the software 'eating the world.'By Charles Babcock Editor at Large, Cloud, 5/30/20170 comments | Read | Post a Comment
AI and machine learning won't create massive job losses in the foreseeable future, but some societal issues to come to mind. By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 5/29/20170 comments | Read | Post a Comment
Cloud Security Alliance sees danger, issues guidelines for how we'll need to secure the connected vehicle environment in the future.By Charles Babcock Editor at Large, Cloud, 5/26/20170 comments | Read | Post a Comment
The administrators of the open-source Samba software have fixed a newly discovered vulnerability that lets attackers upload malicious files to vulnerable systems and servers.By Jai Vijayan Freelance writer, 5/25/20171 Comment | Read | Post a Comment
Successful DevOps initiatives have to include everyone, not just the Dev and Ops staffs, according to Interop ITX speakers.By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 5/25/20170 comments | Read | Post a Comment
Now is a great time to be thinking about architecture, but it’s also important to do it in a way that is incremental and allows you to test ideas and validate them.By Rob Zuber, Chief Technology Officer, CircleCI , 5/25/20170 comments | Read | Post a Comment
The EU's new razor-toothed data privacy law could either rip you apart or help you create the best security program you've ever had. Here's how. By Sara Peters Senior Editor at Dark Reading, 5/25/201712 comments | Read | Post a Comment
More than half of medical device makers and healthcare delivery organizations anticipate an attack on their medical devices within the next 12 months, but only a smattering take significant steps to prevent it, according to a survey released today.By Dawn Kawamoto Associate Editor, Dark Reading, 5/25/20172 comments | Read | Post a Comment
Attackers can inject malicious payloads directly to email server via email encryption appliances, Securolytics says.By Jai Vijayan Freelance writer, 5/25/20178 comments | Read | Post a Comment
A group of major backers has formed the Project19 Foundation to support standardized gear and networking across cloud data centers.By Charles Babcock Editor at Large, Cloud, 5/25/20170 comments | Read | Post a Comment
As computing power becomes increasingly distributed into the devices and infrastructure around us, the data generated by those devices will invariably play a larger role in our businesses and everyday lives. By Tim Bucher, Senior Vice President, Seagate Technology , 5/24/20170 comments | Read | Post a Comment
There are so far 1,254 publicly reported data breaches and 4,837 published vulnerabilities in the first quarter of this year.By Jai Vijayan Freelance writer, 5/23/20170 comments | Read | Post a Comment
In its 19th annual survey, Harvey Nash/KPMG found CIOs preoccupied with making companies more digital, and expected to fill more strategic role.By Charles Babcock Editor at Large, Cloud, 5/23/20171 Comment | Read | Post a Comment
New technology breakthroughs plus the IoT are driving new interest in edge computing. By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 5/23/20172 comments | Read | Post a Comment
Being a CIO isn't just about serving the business; today it means running the IT operation as a business itself.By Craig Williams, Chief Information Officer, Ciena , 5/23/20170 comments | Read | Post a Comment
More than 95% of all of the infected machines were running Windows 7, according to Kaspersky Lab data.By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/22/20170 comments | Read | Post a Comment
The Dynamics Of The Digital WorkplaceAs companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience.Read >>
2017 State of Data and AnalyticsToday's companies are differentiating themselves using data analytics, but the journey requires adjustments to people, processes, technology, and culture.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
To save this item to your list of favorite InformationWeek content so you can find it later in your Profile page, click the "Save It" button next to the item.
If you found this interesting or useful, please use the links to the services below to share it with other readers. You will need a free account with each service to share an item via that service.