IoT
Google, Tesla And Apple Race For Electric, Autonomous Vehicle Talent
Skype Group Video Chats Arrive On iOS, Android
Google Introduces 'Roll Your Own' Option On Compute Engine
Android, iOS Own 98% Of Smartphone Market, Gartner Finds
Tech Entrepreneurs Less Bullish On Economy: Study
News & Commentary
New Trojan Xbot A Swiss-Army Knife Of Malicious Features
Jai Vijayan, Freelance writer
News
Malware can steal banking and card info, encrypt SD cards, intercept messages and more, say researchers at Palo Alto Networks
By Jai Vijayan Freelance writer, 2/19/2016
Comment0 comments  |  Read  |  Post a Comment
Web Gateways Need Backstops
Ericka Chickowski, Contributing Writer, Dark Reading
News
New report emphasizes the importance of layered defense.
By Ericka Chickowski Contributing Writer, Dark Reading, 2/19/2016
Comment0 comments  |  Read  |  Post a Comment
Yahoo Forms Committee To Explore Possible Sale, Options
Dawn Kawamoto, Freelance Writer and Editor
News
Yahoo has formed a strategic committee, made up of its independent board members, to reach out to interested parties in transacting a deal as the company faces greater pressure from activist shareholder Starboard Value to sell its core assets.
By Dawn Kawamoto Freelance Writer and Editor, 2/19/2016
Comment2 comments  |  Read  |  Post a Comment
Smartphone Pricing's Up, But Customers Are Happier
Michelle Maisto, Freelance Writer
News
J.D. Power reports that costs for smartphone customers have increased, but that these consumers are happier than they've ever been -- especially with AT&T.
By Michelle Maisto Freelance Writer, 2/19/2016
Comment1 Comment  |  Read  |  Post a Comment
9 Reasons To Crowdsource Data Science Projects
Lisa Morgan, Freelance Writer
News
The data science talent shortage has some companies thinking outside the box. Even if your company employs a formidable data science team, you would likely still benefit from third-party ideas or solutions. Data science competitions and other forms of crowdsourcing offer viable means of advancing the art of the possible relatively quickly and cost-effectively. We share some of the possibilities.
By Lisa Morgan Freelance Writer, 2/19/2016
Comment1 Comment  |  Read  |  Post a Comment
Adding Up The Total Costs of Ransomware
Andrew Hay, CISO, DataGravity, Inc.
Commentary
It’s a lot more than just the ransom. We did the math.
By Andrew Hay CISO, DataGravity, Inc., 2/19/2016
Comment0 comments  |  Read  |  Post a Comment
Illumio Brings Active Directory To Dynamic Security
Charles Babcock, Editor at Large, Cloud
News
Startup Illumio can apply individual security policies to application users on premises and in the cloud.
By Charles Babcock Editor at Large, Cloud, 2/19/2016
Comment1 Comment  |  Read  |  Post a Comment
Google Introduces 'Roll Your Own' Option On Compute Engine
Charles Babcock, Editor at Large, Cloud
News
Google is now offering Custom Machine Type servers that its customers can configure the way they want. While this option had been in beta, the company is now making the service generally available.
By Charles Babcock Editor at Large, Cloud, 2/19/2016
Comment1 Comment  |  Read  |  Post a Comment
NFL CIO: Super Bowl 50 Tech Was A Game-Changer
Thomas Claburn, Editor at Large, Enterprise Mobility
News
NFL CIO Michelle McKenna-Doyle said Super Bowl 50 was as good as the game has ever been from an operations standpoint.
By Thomas Claburn Editor at Large, Enterprise Mobility, 2/19/2016
Comment1 Comment  |  Read  |  Post a Comment
11 Tech Trailblazers To Honor For Black History Month
Kelly Sheridan, Associate Editor, InformationWeek
News
In honor of Black History Month, we highlight the achievements of 11 pioneers and innovators in the field of science and technology.
By Kelly Sheridan Associate Editor, InformationWeek, 2/19/2016
Comment0 comments  |  Read  |  Post a Comment
Skype Group Video Chats Arrive On iOS, Android
Kelly Sheridan, Associate Editor, InformationWeek
News
Microsoft officially launches group video chats for smartphones and tablets running iOS and Android.
By Kelly Sheridan Associate Editor, InformationWeek, 2/18/2016
Comment3 comments  |  Read  |  Post a Comment
The Secret Life Of Stolen Credentials
Ericka Chickowski, Contributing Writer, Dark Reading
News
Bitglass Threat Research Team's Project Cumulus demonstrates what happens when Google Drive credentials are 'stolen.'
By Ericka Chickowski Contributing Writer, Dark Reading, 2/18/2016
Comment1 Comment  |  Read  |  Post a Comment
Android, iOS Own 98% Of Smartphone Market, Gartner Finds
Eric Zeman,
Commentary
Apple's iOS and Google's Android leave little more than a pittance for Windows and BlackBerry, according to new estimates from Gartner.
By Eric Zeman , 2/18/2016
Comment3 comments  |  Read  |  Post a Comment
Hospital Hacktivist Arrested In Miami After Failed Escape Attempt
Dark Reading Staff,
News
Boston Children's Hospital hacker's flee to Cuba foiled by troubles with getaway boat.
By Dark Reading Staff , 2/18/2016
Comment1 Comment  |  Read  |  Post a Comment
IBM Buys Truven For $2.6 Billion, Boosts Watson Health Unit
Dawn Kawamoto, Freelance Writer and Editor
News
IBM announces plans to acquire Truven Health Analytics, in a move to push its Watson Health deeper into the healthcare industry.
By Dawn Kawamoto Freelance Writer and Editor, 2/18/2016
Comment0 comments  |  Read  |  Post a Comment
Apple Vs. FBI: Tech, Politics Weigh In On iPhone Case
Michelle Maisto, Freelance Writer
News
With a Tweet, the founder of WhiteHat Security may have nudged Google's CEO to take a side, and the rest of the world is beginning to do the same.
By Michelle Maisto Freelance Writer, 2/18/2016
Comment6 comments  |  Read  |  Post a Comment
Security Lessons From My Car Mechanic
Adam Shostack, Founder, Stealth Startup
Commentary
What an unlocked oil pan taught me about me about the power of two-way communication between security pros and the organizations they serve.
By Adam Shostack Founder, Stealth Startup, 2/18/2016
Comment5 comments  |  Read  |  Post a Comment
Google Gmailify: Gmail On Yahoo, Outlook
Nathan Eddy, Freelance Writer
News
Google looks to bring some of Gmail's most popular features to users of other email accounts, including Yahoo Mail and Microsoft's Outlook.com.
By Nathan Eddy Freelance Writer, 2/18/2016
Comment7 comments  |  Read  |  Post a Comment
Gartner Magic Quadrant Advanced Analytics: Fast Growth Continues
Jessica Davis,  Senior Editor, Enterprise Apps
News
The Gartner Magic Quadrant Advanced Analytics report shows the market is growing quickly for platforms that use data and algorithms to predict, prescribe, optimize, and simulate. A big name has moved into the Leaders quadrant for the first time this year.
By Jessica Davis Senior Editor, Enterprise Apps, 2/18/2016
Comment0 comments  |  Read  |  Post a Comment
Navigating Next-Gen Endpoint Security: A Buyer’s Journey
Doug Cahill, Senior Analyst, Enterprise Strategy Group
Commentary
Organizations will face a market in a state of transition as they evaluate information security solutions from both new and established vendors.
By Doug Cahill Senior Analyst, Enterprise Strategy Group, 2/18/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
iPhone 7 Vs. Galaxy S7: Comparing Smartphone Rumors
Michelle Maisto, Freelance Writer,  2/13/2016
Apple Fights FBI Over Disabling Security In San Bernadino Case
Thomas Claburn, Editor at Large, Enterprise Mobility,  2/18/2016
Where 2016 US Presidential Contenders Stand On Tech Issues
Michelle Maisto, Freelance Writer,  2/14/2016
Register for InformationWeek Newsletters
White Papers
Current Issue
How to Knock Down Barriers to Effective Risk Management
Risk management today is a hodgepodge of systems, siloed approaches, and poor data collection practices. That isn't how it should be.
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of February 14, 2016.